Sciweavers

2310 search results - page 385 / 462
» Managing System and Active-Content Integrity
Sort
View
COMPLEXITY
2007
151views more  COMPLEXITY 2007»
13 years 7 months ago
From complex conflicts to stable cooperation: Cases in environment and security
: Conflict is a dynamic and complex form of human interaction, often emerging from incompatible actions, values and goals, and consuming a considerable amount of resources. Conflic...
Jürgen Scheffran, Bruce Hannon
DAWAK
2009
Springer
13 years 5 months ago
Towards a Modernization Process for Secure Data Warehouses
Data Warehouses (DW) manage crucial enterprise information used for the decision making process which has to be protected from unauthorized accesses. However, security constraints ...
Carlos Blanco, Ricardo Pérez-Castillo, Arnu...
DEBU
2010
129views more  DEBU 2010»
13 years 5 months ago
Flash in a DBMS: Where and How?
Over the past decade, new solid state storage technologies, with flash being the most mature one, have become increasingly popular. Such technologies store data durably, and can a...
Manos Athanassoulis, Anastasia Ailamaki, Shimin Ch...
HIKM
2006
ACM
14 years 1 months ago
A flexible approach for electronic medical records exchange
Many methodologies have been proposed in the last decade for integration and exchange of medical data. However, little progress has occurred due to the following reasons. First, p...
Vagelis Hristidis, Peter J. Clarke, Nagarajan Prab...
CF
2004
ACM
14 years 1 months ago
Repairing return address stack for buffer overflow protection
Although many defense mechanisms against buffer overflow attacks have been proposed, buffer overflow vulnerability in software is still one of the most prevalent vulnerabilities e...
Yong-Joon Park, Gyungho Lee