Sciweavers

228 search results - page 10 / 46
» An Architecture of a Secure Database for Networked Collabora...
Sort
View
CN
2002
87views more  CN 2002»
13 years 8 months ago
Securing distributed adaptation
Open architecture networks provide applications with fine-grained control over network elements. With this control comes the risk of misuse and new challenges to security beyond th...
Jun Li, Mark Yarvis, Peter L. Reiher
PCI
2005
Springer
14 years 2 months ago
Workflow Based Security Incident Management
Security incident management is one of the critical areas that offers valuable information to security experts, but still lacks much development. Currently, several security incide...
Meletis A. Belsis, Alkis Simitsis, Stefanos Gritza...
EDBT
2008
ACM
194views Database» more  EDBT 2008»
14 years 9 months ago
XCraft: boosting the performance of active XML materialization
An active XML (AXML) document contains tags representing calls to Web services. Therefore, retrieving its contents consists in materializing its data elements by invoking the embe...
Gabriela Ruberg, Marta Mattoso
ADBIS
2006
Springer
160views Database» more  ADBIS 2006»
13 years 11 months ago
Data Ring: Let Us Turn the Net into a Database!
Because of information ubiquity, one observes an important trend towards transferring information management tasks from database systems to networks. We introduce the notion of Da...
Serge Abiteboul, Neoklis Polyzotis
ER
2006
Springer
96views Database» more  ER 2006»
14 years 19 days ago
Understanding the Semantics of Data Provenance to Support Active Conceptual Modeling
: Data Provenance refers to the lineage of data including its origin, key events that occur over the course of its lifecycle, and other details associated with data creation, proce...
Sudha Ram, Jun Liu