Sciweavers

1830 search results - page 79 / 366
» Implementing a Tamper-Evident Database System
Sort
View
ICDE
2009
IEEE
143views Database» more  ICDE 2009»
14 years 11 months ago
Auditing a Database under Retention Restrictions
Auditing the changes to a database is critical for identifying malicious behavior, maintaining data quality, and improving system performance. But an accurate audit log is a histor...
Wentian Lu, Gerome Miklau
DEXA
2005
Springer
112views Database» more  DEXA 2005»
14 years 3 months ago
Distribution Rules for Array Database Queries
Abstract. Non-trivial retrieval applications involve complex computations on large multi-dimensional datasets. These should, in principle, benefit from the use of relational datab...
Alex van Ballegooij, Roberto Cornacchia, Arjen P. ...
RSKT
2007
Springer
14 years 4 months ago
ROSA: An Algebra for Rough Spatial Objects in Databases
Abstract. A fundamental data modeling problem in geographical information systems and spatial database systems refers to an appropriate treatment of the vagueness or indeterminacy ...
Markus Schneider, Alejandro Pauly
VLDB
2002
ACM
139views Database» more  VLDB 2002»
14 years 10 months ago
TIMBER: A native XML database
Abstract This paper describes the overall design and architecture of the Timber XML database system currently being implemented at the University of Michigan. The system is based u...
H. V. Jagadish, Shurug Al-Khalifa, Adriane Chapman...
NDSS
2009
IEEE
14 years 4 months ago
Two-Party Computation Model for Privacy-Preserving Queries over Distributed Databases
Many existing privacy-preserving techniques for querying distributed databases of sensitive information do not scale for large databases due to the use of heavyweight cryptographi...
Sherman S. M. Chow, Jie-Han Lee, Lakshminarayanan ...