Sciweavers

10210 search results - page 179 / 2042
» Configuring Database Systems
Sort
View
IDEAS
2008
IEEE
96views Database» more  IDEAS 2008»
14 years 5 months ago
Robust aggregation in peer-to-peer database systems
Peer-to-peer database systems (P2PDBs) aim at providing database services with node autonomy, high availability and loose coupling between participating nodes by building the DBMS...
Norvald H. Ryeng, Kjetil Nørvåg
ACSAC
2002
IEEE
14 years 3 months ago
Architectures for Intrusion Tolerant Database Systems
In this paper, we propose four architectures for intrusion-tolerant database systems. While traditional secure database systems rely on prevention controls, an intrusion-tolerant ...
Peng Liu
ICETE
2004
204views Business» more  ICETE 2004»
14 years 23 hour ago
A Real-Time Intrusion Prevention System for Commercial Enterprise Databases
: - Modern intrusion detection systems are comprised of three basically different approaches, host based, network based, and a third relatively recent addition called procedural ba...
Ulf T. Mattsson
GVD
2009
108views Database» more  GVD 2009»
13 years 8 months ago
Privacy Challenges for Database Systems
Over the last years the means to collect personal data implicitly or explicitly over the Web and by various kinds of sensors and to combine data for profiling individuals has dram...
Johann Christoph Freytag
ICDE
2005
IEEE
124views Database» more  ICDE 2005»
15 years 1 hour ago
Design, Implementation, and Evaluation of a Repairable Database Management System
Although conventional database management systems are designed to tolerate hardware and to a lesser extent even software errors, they cannot protect themselves against syntactical...
Tzi-cker Chiueh, Dhruv Pilania