Sciweavers

607 search results - page 5 / 122
» Managing Constraint Violations in Administrative Information...
Sort
View
ISCC
2006
IEEE
14 years 3 months ago
An Autonomous Architecture for Inter-Domain Traceback across the Borders of Network Operation
The difficulties of achieving an inter-domain traceback architecture come from the issues of overcoming network operation boundaries, especially the leakage of sensitive informat...
Hiroaki Hazeyama, Youki Kadobayashi, Daisuke Miyam...
SACMAT
2003
ACM
14 years 3 months ago
Role mining - revealing business roles for security administration using data mining technology
In this paper we describe the work devising a new technique for role-finding to implement Role-Based Security Administration. Our results stem from industrial projects, where larg...
Martin Kuhlmann, Dalia Shohat, Gerhard Schimpf
UIST
2005
ACM
14 years 3 months ago
A1: end-user programming for web-based system administration
System administrators work with many different tools to manage and fix complex hardware and software infrastructure in a rapidly paced work environment. Through extensive field st...
Eser Kandogan, Eben M. Haber, Rob Barrett, Allen C...
ADVIS
2006
Springer
14 years 3 months ago
Checking Violation Tolerance of Approaches to Database Integrity
A hitherto unquestioned assumption made by all methods for integrity checking has been that the database satisfies its constraints before each update. This consistency assumption ...
Hendrik Decker, Davide Martinenghi
ICDIM
2008
IEEE
14 years 4 months ago
Dynamic detection and administration of materialized views based on the Query Graph Model
Database Management Systems (DBMS) are complex software systems which are used in an increasing number of applications. To obtain the best performance for business relevant applic...
Andreas Lübcke, Ingolf Geist, Ronny Bubke