Sciweavers

370 search results - page 14 / 74
» Data versioning techniques for internet transaction manageme...
Sort
View
ICEIS
2002
IEEE
14 years 18 days ago
DIDAFIT: Detecting Intrusions in Databases Through Fingerprinting Transactions
: The most valuable information assets of an organization are often stored in databases and it is pertinent for such organizations to ensure the integrity and confidentiality of t...
Wai Lup Low, Joseph Lee, Peter Teoh
BIRTHDAY
2003
Springer
14 years 26 days ago
Spatial Data Management for Virtual Product Development
Abstract: In the automotive and aerospace industry, millions of technical documents are generated during the development of complex engineering products. Particularly, the universa...
Hans-Peter Kriegel, Martin Pfeifle, Marco Pöt...
SC
2003
ACM
14 years 27 days ago
Quantifying and Improving the Availability of High-Performance Cluster-Based Internet Services
Cluster-based servers can substantially increase performance when nodes cooperate to globally manage resources. However, in this paper we show that cooperation results in a substa...
Kiran Nagaraja, Neeraj Krishnan, Ricardo Bianchini...
INFOSCALE
2007
ACM
13 years 9 months ago
A dubiety-determining based model for database cumulated anomaly intrusion
— The concept of Cumulated Anomaly (CA), which describes a new type of database anomalies, is addressed. A typical CA intrusion is that when a user who is authorized to modify da...
Gang Lu, Junkai Yi, Kevin Lü
ACMICEC
2003
ACM
113views ECommerce» more  ACMICEC 2003»
14 years 27 days ago
PayCash: a secure efficient Internet payment system
This paper describes PayCash, an Internet payment system that was designed to offer strong security and privacy protection. This system is based on the concept of electronic cash,...
Jon M. Peha, Ildar M. Khamitov