Sciweavers

1761 search results - page 77 / 353
» Data Sharing and Querying for Peer-to-Peer Data Management S...
Sort
View
RAID
2010
Springer
13 years 8 months ago
A Data-Centric Approach to Insider Attack Detection in Database Systems
The insider threat against database management systems is a dangerous security problem. Authorized users may abuse legitimate privileges to masquerade as other users or to maliciou...
Sunu Mathew, Michalis Petropoulos, Hung Q. Ngo, Sh...
ICWS
2007
IEEE
13 years 12 months ago
Capacity Management and Demand Prediction for Next Generation Data Centers
Advances in server, network, and storage virtualization are enabling the creation of resource pools of servers that permit multiple application workloads to share each server in t...
Daniel Gmach, Jerry Rolia, Ludmila Cherkasova, Alf...
CIKM
2005
Springer
14 years 3 months ago
Securing XML data in third-party distribution systems
Web-based third-party architectures for data publishing are today receiving growing attention, due to their scalability and the ability to efficiently manage large numbers of use...
Barbara Carminati, Elena Ferrari, Elisa Bertino
CCS
2007
ACM
14 years 4 months ago
Automaton segmentation: a new approach to preserve privacy in xml information brokering
A Distributed Information Brokering System (DIBS) is a peer-to-peer overlay network that comprises diverse data servers and brokering components helping client queries locate the ...
Fengjun Li, Bo Luo, Peng Liu, Dongwon Lee, Chao-Hs...
FAST
2009
13 years 8 months ago
Application of Named Graphs Towards Custom Provenance Views
Provenance capture as applied to execution oriented and interactive workflows is designed to record minute detail needed to support a "modify and restart" paradigm as we...
Tara Gibson, Karen Schuchardt, Eric G. Stephan