Sciweavers

64 search results - page 7 / 13
» Database auditing
Sort
View
IJMI
2007
140views more  IJMI 2007»
13 years 7 months ago
Securing electronic health records without impeding the flow of information
Objective: We present an integrated set of technologies, known as the Hippocratic Database, that enable healthcare enterprises to comply with privacy and security laws without imp...
Rakesh Agrawal, Christopher M. Johnson
SIGMOD
2001
ACM
166views Database» more  SIGMOD 2001»
14 years 7 months ago
ADAM: A Testbed for Exploring the Use of Data Mining in Intrusion Detection
Intrusion detection systems have traditionally been based on the characterization of an attack and the tracking of the activity on the system to see if it matches that characteriz...
Daniel Barbará, Julia Couto, Sushil Jajodia, Ning...
DEBS
2003
ACM
14 years 21 days ago
Information sharing with the Oracle database
Database systems have been designed to manage business critical information and make this information accessible on request to connected clients. There is, however, an ever-increa...
Dieter Gawlick, Shailendra Mishra
ISASSCI
2001
13 years 8 months ago
Towards Optimal Database Maintenance in Wireless Communication Systems
To ensure the consistency of database subsystems involved in wireless communication systems, appropriate scheduled maintenance policies are necessary. However, the short-persisten...
Amine Chohra, Felicita Di Giandomenico, Stefano Po...
ICDE
2009
IEEE
120views Database» more  ICDE 2009»
14 years 9 months ago
Improving Transaction-Time DBMS Performance and Functionality
Immortal DB is a transaction time database system that is built into a commercial database system rather than being layered on top. This enables it to have performance that is very...
David B. Lomet, Feifei Li