Sciweavers

1830 search results - page 30 / 366
» Implementing a Tamper-Evident Database System
Sort
View
BTW
2007
Springer
110views Database» more  BTW 2007»
14 years 1 months ago
Melting Pot XML: Bringing File Systems and Databases One Step Closer
: Ever-growing data volumes demand for storage systems beyond current file systems abilities, particularly, a powerful querying capability. With the rise of XML, the database comm...
Alexander Holupirek, Christian Grün, Marc H. ...
OODBS
1992
110views Database» more  OODBS 1992»
13 years 11 months ago
An Approach to Behavior Sharing in Federated Database Systems
An approach and mechanismto support the sharing of behavior amongthe component database systems in a federation is described. In the context of a functional object-based database ...
Doug Fang, Joachim Hammer, Dennis McLeod
ICDE
2005
IEEE
137views Database» more  ICDE 2005»
14 years 9 months ago
Extending Relational Database Systems to Automatically Enforce Privacy Policies
Databases are at the core of successful businesses. Due to the voluminous stores of personal data being held by companies today, preserving privacy has become a crucial requiremen...
Rakesh Agrawal, Paul Bird, Tyrone Grandison, Jerry...
SIGMOD
2000
ACM
121views Database» more  SIGMOD 2000»
14 years 14 hour ago
MOCHA: A Self-Extensible Database Middleware System for Distributed Data Sources
We present MOCHA, a new self-extensible database middleware system designed to interconnect distributed data sources. MOCHA is designed to scale to large environments and is based...
Manuel Rodriguez-Martinez, Nick Roussopoulos
ACSAC
2001
IEEE
13 years 11 months ago
DAIS: A Real-Time Data Attack Isolation System for Commercial Database Applications
Traditional database security mechanisms are very limited in defending successful data attacks. Authorized but malicious transactions can make a database useless by impairing its ...
Peng Liu