Sciweavers

64 search results - page 8 / 13
» Database auditing
Sort
View
ICDE
2006
IEEE
128views Database» more  ICDE 2006»
14 years 1 months ago
Taming Compliance with Sarbanes-Oxley Internal Controls Using Database Technology
The Sarbanes-Oxley Act instituted a series of corporate reforms to improve the accuracy and reliability of financial reporting. Sections 302 and 404 of the Act require SEC-reporti...
Rakesh Agrawal, Christopher M. Johnson, Jerry Kier...
SIGMOD
2008
ACM
140views Database» more  SIGMOD 2008»
14 years 7 months ago
Skippy: a new snapshot indexing method for time travel in the storage manager
The storage manager of a general-purpose database system can retain consistent disk page level snapshots and run application programs "back-in-time" against long-lived p...
Ross Shaull, Liuba Shrira, Hao Xu
TASLP
2008
124views more  TASLP 2008»
13 years 7 months ago
Semantic Annotation and Retrieval of Music and Sound Effects
We present a computer audition system that can both annotate novel audio tracks with semantically meaningful words and retrieve relevant tracks from a database of unlabeled audio c...
Douglas Turnbull, Luke Barrington, D. Torres, Gert...
ICDE
2009
IEEE
195views Database» more  ICDE 2009»
14 years 2 months ago
The PRISM Workwench: Database Schema Evolution without Tears
— Information Systems are subject to a perpetual evolution, which is particularly pressing in Web Information Systems, due to their distributed and often collaborative nature. Su...
Carlo Curino, Hyun J. Moon, MyungWon Ham, Carlo Za...
CLEIEJ
1998
134views more  CLEIEJ 1998»
13 years 7 months ago
Firewall Monitoring
Securing resources against unauthorized access and/or use is a major concern of every organization that uses computer networks. To protect internal networks from external attacks,...
Ernst L. Leiss, Jianyu You