Sciweavers

CIDR
2007
113views Algorithms» more  CIDR 2007»
14 years 1 months ago
Securing history: Privacy and accountability in database systems
Databases that preserve a historical record of activities and data offer the important benefit of system accountability: past events can be analyzed to detect breaches and maint...
Gerome Miklau, Brian Neil Levine, Patrick Stahlber...
DBSEC
2010
152views Database» more  DBSEC 2010»
14 years 1 months ago
Modelling Dynamic Access Control Policies for Web-Based Collaborative Systems
Abstract. We present a modelling language, called X-Policy, for webbased collaborative systems with dynamic access control policies. The access to resources in these systems depend...
Hasan Qunoo, Mark Ryan
DBSEC
2010
319views Database» more  DBSEC 2010»
14 years 1 months ago
Detecting Spam Bots in Online Social Networking Sites: A Machine Learning Approach
As online social networking sites become more and more popular, they have also attracted the attentions of the spammers. In this paper, Twitter, a popular micro-blogging service, i...
Alex Hai Wang
DBSEC
2010
126views Database» more  DBSEC 2010»
14 years 1 months ago
Mining Likely Properties of Access Control Policies via Association Rule Mining
Abstract. Access control mechanisms are used to control which principals (such as users or processes) have access to which resources based on access control policies. To ensure the...
JeeHyun Hwang, Tao Xie, Vincent C. Hu, Mine Altuna...
DBSEC
2010
129views Database» more  DBSEC 2010»
14 years 1 months ago
Secure Outsourcing of DNA Searching via Finite Automata
This work treats the problem of error-resilient DNA searching via oblivious evaluation of finite automata, formulated as follows: a client has a DNA sequence, and a service provid...
Marina Blanton, Mehrdad Aliasgari
DBSEC
2010
162views Database» more  DBSEC 2010»
14 years 1 months ago
Distributed and Secure Access Control in P2P Databases
The intent of peer data management systems (PDMS) is to share as much data as possible. However, in many applications leveraging sensitive data, users demand adequate mechanisms to...
Angela Bonifati, Ruilin Liu, Hui (Wendy) Wang
DBSEC
2010
101views Database» more  DBSEC 2010»
14 years 1 months ago
Generalizing PIR for Practical Private Retrieval of Public Data
Private retrieval of public data is useful when a client wants to query a public data service without revealing the specific query data to the server. Computational Private Informa...
Shiyuan Wang, Divyakant Agrawal, Amr El Abbadi
DBSEC
2010
161views Database» more  DBSEC 2010»
14 years 1 months ago
Secure Location Verification - A Security Analysis of GPS Signal Authentication
The use of location based services has increased significantly over the last few years. However, location information is only sparsely used as a security mechanism. One of the reas...
Georg T. Becker, Sherman C. Lo, David S. De Lorenz...
DBSEC
2010
137views Database» more  DBSEC 2010»
14 years 1 months ago
Constructing Key Assignment Schemes from Chain Partitions
Abstract. In considering a problem in access control for scalable multimedia formats, we have developed new methods for constructing a key assignment scheme. Our first contribution...
Jason Crampton, Rosli Daud, Keith M. Martin
BNCOD
2007
104views Database» more  BNCOD 2007»
14 years 1 months ago
Integrity Checking and Maintenance with Active Rules in XML Databases
While specification languages for integrity constraints for XML data have been considered in the literature, actual technologies and methodologies for checking and maintaining in...
Henning Christiansen, Maria Rekouts