Sciweavers

1830 search results - page 13 / 366
» Implementing a Tamper-Evident Database System
Sort
View
CAISE
2004
Springer
14 years 1 months ago
Secure Databases: An Analysis of Clark-Wilson Model in a Database Environment
Abstract. Information systems are vulnerable to accidental or malicious attacks. Security models for commercial computer systems exist, but information systems security is often ig...
Xiaocheng Ge, Fiona Polack, Régine Laleau
IDEAS
2003
IEEE
91views Database» more  IDEAS 2003»
14 years 27 days ago
Implementation Issues of a Deterministic Transformation System for Structured Document Query Optimization
As the popularity of XML keeps growing rapidly, XML compliant structured document management becomes an interesting and compelling research area. Query optimization for structured...
Dunren Che
SSDBM
2009
IEEE
166views Database» more  SSDBM 2009»
14 years 2 months ago
Design and Implementation of Metadata System in PetaShare
As the size of scientific and commercial datasets grows, it becomes imperative that an expressive metadata framework to be developed to facilitate access to the semantics of the d...
Xinqi Wang, Tevfik Kosar
GI
2009
Springer
13 years 5 months ago
Automatic Population and Updating of a Semantic Wiki-based Configuration Management Database
Abstract: This paper describes our work on designing and implementing a component for automatically integrating and updating information about configuration items into a Semantic W...
Frank Kleiner, Andreas Abecker, Ning Liu

Lecture Notes
5297views
15 years 5 months ago
Database-Management Principles And Applications
The Lecture notes covers database architecture, design, administration, and implementation. Evaluation and use of database-management systems for computers, with emphasis on microc...
R. E. Wyllys