找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Secure Data Management; Second VLDB Workshop Willem Jonker,Milan Petković Conference proceedings 2005 Springer-Verlag Berlin Heidelberg 200

[复制链接]
楼主: Boldfaced
发表于 2025-3-25 07:18:15 | 显示全部楼层
发表于 2025-3-25 07:59:07 | 显示全部楼层
Dynamic Disclosure Monitor (, , ,): An Improved Query Processing Solutionncies. We show how this process can be used to extend D.Mon to reduce the number of tuples that must be examined in the history database when computing inferences. We further show that inferences that are computed by D.Mon using our extension are . and ..
发表于 2025-3-25 11:40:37 | 显示全部楼层
Suppressing Microdata to Prevent Probabilistic Classification Based Inferenceto privacy. In this paper we concentrate on probabilistic classification, which is a specific data mining technique widely used for prediction purposes, and propose methods for downgrading probabilistic classification models in order to block the inference of hidden microdata values.
发表于 2025-3-25 17:26:58 | 显示全部楼层
XML Security in the Next Generation Optical Disc Contextios where XML Security can be applied to markup based interactive applications in the context of a next generation Consumer Electronic Optical Disc Player. We conclude the paper by presenting a prototype establishing how these scenarios could be realized in practice.
发表于 2025-3-25 20:32:22 | 显示全部楼层
发表于 2025-3-26 03:26:25 | 显示全部楼层
Metadata Management in Outsourced Encrypted Databases provider. Outsourcing databases to external providers promises higher availability and more effective disaster protection than in-house operations. This scenario presents new research challenges on which the usability of the system is based. In particular, one important aspect is the . that must be
发表于 2025-3-26 06:47:31 | 显示全部楼层
Experiments with Queries over Encrypted Data Using Secret Sharingbes a working prototype of an encrypted database system that allows remote querying over the encrypted data. Experiments with the system show the practical impact of our encoding scheme on storage space and CPU time. Two algorithms, each with two different matching rules, are compared to each other.
发表于 2025-3-26 11:28:03 | 显示全部楼层
An Authorization Framework for Sharing Data in Web Service Federationsations. Building on previous work, where we showed how the access control of Web services can be consolidated with the access control of the underlying database systems, we focus on the delegation of trust across administrative boundaries, thus enabling inter-organizational collaboration. In order t
发表于 2025-3-26 12:39:44 | 显示全部楼层
User-Managed Access Control for Health Care Systemscess control system in which corporate policy can allow all health record owners to administer access control over their own objects, and at the same time, all objects are reasonably secure. We exploit various concepts of Rule Based Access Control, Role Based Access Control, XML structures, and obje
发表于 2025-3-26 19:25:56 | 显示全部楼层
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-6-20 11:44
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表