MIR 发表于 2025-3-23 12:50:28

http://reply.papertrans.cn/83/8278/827750/827750_11.png

SNEER 发表于 2025-3-23 16:22:15

Deductive Database Securitye combines meta-programming and partial evaluation techniques, has a number of attractive technical results associated with it, and can be used as a basis for efficient implementations of protected forms of deductive database.

神圣将军 发表于 2025-3-23 20:10:16

http://reply.papertrans.cn/83/8278/827750/827750_13.png

水汽 发表于 2025-3-24 02:07:37

http://reply.papertrans.cn/83/8278/827750/827750_14.png

爱国者 发表于 2025-3-24 02:35:46

http://reply.papertrans.cn/83/8278/827750/827750_15.png

cornucopia 发表于 2025-3-24 07:41:59

On Security and Privacy Risks in Association Mining Algorithmsn this paper, we present a risk assessment procedure designed to control the security and privacy threats presented by association mining algorithms. The assessment procedure is based upon a new data analysis process that we introduce called Knowledge Hiding in Databases (KHD). The specific contribu

mercenary 发表于 2025-3-24 14:41:40

Mining Malicious Corruption of Data with Hidden Markov Modelsf profiling databases via time series analysis to detect anomalous changes to a database. We view the history of modifications in the database as a set of time series sequences. We then examine the application of Hidden Markov models (HMMs)as a mining tool to capture the normal trend of a database’s

ANIM 发表于 2025-3-24 15:24:04

1868-4238 ed on maintaining security and privacy in database systems and applications that pervade cyberspace. The areas of coverage include: .-Role-Based Access Control; .-Database Security; .-XML Security; .-Data Mining and Inference; .-Multimedia System Security; .-Network Security; .-Public Key Infrastruc

opprobrious 发表于 2025-3-24 19:53:02

http://reply.papertrans.cn/83/8278/827750/827750_19.png

Peculate 发表于 2025-3-25 02:46:53

http://reply.papertrans.cn/83/8278/827750/827750_20.png
页: 1 [2] 3 4 5 6
查看完整版本: Titlebook: Research Directions in Data and Applications Security; IFIP TC11 / WG11.3 S Ehud Gudes,Sujeet Shenoi Book 2003 IFIP International Federatio