Sciweavers

178 search results - page 31 / 36
» Access control for a replica management database
Sort
View
CSCWD
2006
Springer
13 years 10 months ago
Using Isolation Spheres for Cooperative Processes Correctness
Managing cooperation in Business Processes still represents a challenge because of several problems. Concurrent access to common data, coherence of the results, organisation and c...
Adnene Guabtni, François Charoy, Claude God...
DMDW
2000
118views Management» more  DMDW 2000»
13 years 8 months ago
View security as the basis for data warehouse security
Access. permissions in a data warehouse are currently managed in a separate world from the sources' policies. The consequences are inconsistencies, slow response to change, a...
Arnon Rosenthal, Edward Sciore
ICIP
2010
IEEE
13 years 4 months ago
Security analysis for privacy preserving search of multimedia
With the increasing popularity of digital multimedia such as images and videos and the advent of the cloud computing paradigm, a fast growing amount of private and sensitive multi...
Wenjun Lu, Avinash L. Varna, Min Wu
VLDB
2007
ACM
187views Database» more  VLDB 2007»
14 years 7 months ago
Secure Data Outsourcing
The networked and increasingly ubiquitous nature of today's data management services mandates assurances to detect and deter malicious or faulty behavior. This is particularly...
Radu Sion
SIGMOD
2011
ACM
331views Database» more  SIGMOD 2011»
12 years 9 months ago
Query optimization techniques for partitioned tables
Table partitioning splits a table into smaller parts that can be accessed, stored, and maintained independent of one another. From their traditional use in improving query perform...
Herodotos Herodotou, Nedyalko Borisov, Shivnath Ba...