PHAG 发表于 2025-3-25 07:18:15

http://reply.papertrans.cn/87/8633/863279/863279_21.png

collagen 发表于 2025-3-25 07:59:07

Dynamic Disclosure Monitor (, , ,): An Improved Query Processing Solutionncies. We show how this process can be used to extend D.Mon to reduce the number of tuples that must be examined in the history database when computing inferences. We further show that inferences that are computed by D.Mon using our extension are . and ..

Ergots 发表于 2025-3-25 11:40:37

Suppressing Microdata to Prevent Probabilistic Classification Based Inferenceto privacy. In this paper we concentrate on probabilistic classification, which is a specific data mining technique widely used for prediction purposes, and propose methods for downgrading probabilistic classification models in order to block the inference of hidden microdata values.

极为愤怒 发表于 2025-3-25 17:26:58

XML Security in the Next Generation Optical Disc Contextios where XML Security can be applied to markup based interactive applications in the context of a next generation Consumer Electronic Optical Disc Player. We conclude the paper by presenting a prototype establishing how these scenarios could be realized in practice.

Popcorn 发表于 2025-3-25 20:32:22

http://reply.papertrans.cn/87/8633/863279/863279_25.png

赞成你 发表于 2025-3-26 03:26:25

Metadata Management in Outsourced Encrypted Databases provider. Outsourcing databases to external providers promises higher availability and more effective disaster protection than in-house operations. This scenario presents new research challenges on which the usability of the system is based. In particular, one important aspect is the . that must be

一个搅动不安 发表于 2025-3-26 06:47:31

Experiments with Queries over Encrypted Data Using Secret Sharingbes a working prototype of an encrypted database system that allows remote querying over the encrypted data. Experiments with the system show the practical impact of our encoding scheme on storage space and CPU time. Two algorithms, each with two different matching rules, are compared to each other.

acrophobia 发表于 2025-3-26 11:28:03

An Authorization Framework for Sharing Data in Web Service Federationsations. Building on previous work, where we showed how the access control of Web services can be consolidated with the access control of the underlying database systems, we focus on the delegation of trust across administrative boundaries, thus enabling inter-organizational collaboration. In order t

agitate 发表于 2025-3-26 12:39:44

User-Managed Access Control for Health Care Systemscess control system in which corporate policy can allow all health record owners to administer access control over their own objects, and at the same time, all objects are reasonably secure. We exploit various concepts of Rule Based Access Control, Role Based Access Control, XML structures, and obje

狂热文化 发表于 2025-3-26 19:25:56

http://reply.papertrans.cn/87/8633/863279/863279_30.png
页: 1 2 [3] 4 5 6
查看完整版本: Titlebook: Secure Data Management; Second VLDB Workshop Willem Jonker,Milan Petković Conference proceedings 2005 Springer-Verlag Berlin Heidelberg 200