MIR 发表于 2025-3-23 12:50:28
http://reply.papertrans.cn/83/8278/827750/827750_11.pngSNEER 发表于 2025-3-23 16:22:15
Deductive Database Securitye combines meta-programming and partial evaluation techniques, has a number of attractive technical results associated with it, and can be used as a basis for efficient implementations of protected forms of deductive database.神圣将军 发表于 2025-3-23 20:10:16
http://reply.papertrans.cn/83/8278/827750/827750_13.png水汽 发表于 2025-3-24 02:07:37
http://reply.papertrans.cn/83/8278/827750/827750_14.png爱国者 发表于 2025-3-24 02:35:46
http://reply.papertrans.cn/83/8278/827750/827750_15.pngcornucopia 发表于 2025-3-24 07:41:59
On Security and Privacy Risks in Association Mining Algorithmsn this paper, we present a risk assessment procedure designed to control the security and privacy threats presented by association mining algorithms. The assessment procedure is based upon a new data analysis process that we introduce called Knowledge Hiding in Databases (KHD). The specific contribumercenary 发表于 2025-3-24 14:41:40
Mining Malicious Corruption of Data with Hidden Markov Modelsf profiling databases via time series analysis to detect anomalous changes to a database. We view the history of modifications in the database as a set of time series sequences. We then examine the application of Hidden Markov models (HMMs)as a mining tool to capture the normal trend of a database’sANIM 发表于 2025-3-24 15:24:04
1868-4238 ed on maintaining security and privacy in database systems and applications that pervade cyberspace. The areas of coverage include: .-Role-Based Access Control; .-Database Security; .-XML Security; .-Data Mining and Inference; .-Multimedia System Security; .-Network Security; .-Public Key Infrastrucopprobrious 发表于 2025-3-24 19:53:02
http://reply.papertrans.cn/83/8278/827750/827750_19.pngPeculate 发表于 2025-3-25 02:46:53
http://reply.papertrans.cn/83/8278/827750/827750_20.png