Sciweavers

1830 search results - page 75 / 366
» Implementing a Tamper-Evident Database System
Sort
View
CLEIEJ
1998
134views more  CLEIEJ 1998»
13 years 9 months ago
Firewall Monitoring
Securing resources against unauthorized access and/or use is a major concern of every organization that uses computer networks. To protect internal networks from external attacks,...
Ernst L. Leiss, Jianyu You
TPDS
1998
112views more  TPDS 1998»
13 years 9 months ago
Parallel Computation in Biological Sequence Analysis
—A massive volume of biological sequence data is available in over 36 different databases worldwide, including the sequence data generated by the Human Genome project. These data...
Tieng K. Yap, Ophir Frieder, Robert L. Martino
SAC
2008
ACM
13 years 9 months ago
XBird/D: distributed and parallel XQuery processing using remote proxy
In this paper, we focus on an aspect of distributed XQuery processing that involves data exchanges between processor elements. We first address problems of distributed XML query p...
Makoto Yui, Jun Miyazaki, Shunsuke Uemura, Hirokaz...
NCA
2007
IEEE
14 years 4 months ago
GORDA: An Open Architecture for Database Replication
Although database replication has been a standard feature in database management systems for a long time, third party solutions have been enjoying an increasing popularity. These ...
Alfrânio Correia Jr., José Pereira, L...
CCS
2007
ACM
14 years 4 months ago
Trust management services in relational databases
Trust management represents today a promising approach for supporting access control in open environments. While several approaches have been proposed for trust management and sig...
Sabrina De Capitani di Vimercati, Sushil Jajodia, ...