Sciweavers

14 search results - page 3 / 3
» Mining for insider threats in business transactions and proc...
Sort
View
DAWAK
2005
Springer
14 years 4 months ago
Event-Feeded Dimension Solution
Abstract. From the point of view of a data warehouse system its part of collecting and receiving information from other systems is crucial for all subsequent business intelligence ...
Tho Manh Nguyen, Jaromir Nemec, Martin Windisch
ACSAC
2005
IEEE
14 years 4 months ago
Intrusion Detection in RBAC-administered Databases
A considerable effort has been recently devoted to the development of Database Management Systems (DBMS) which guarantee high assurance security and privacy. An important componen...
Elisa Bertino, Ashish Kamra, Evimaria Terzi, Athen...
DSS
2007
226views more  DSS 2007»
13 years 10 months ago
Dare to share: Protecting sensitive knowledge with data sanitization
chool of Business Research – FY 2007 Research Abstracts Dare to Share: Protecting Sensitive Knowledge with Data Sanitization Data sanitization is a process that is used to promot...
Ali Amiri
KDD
2005
ACM
125views Data Mining» more  KDD 2005»
14 years 4 months ago
Price prediction and insurance for online auctions
Online auctions are generating a new class of fine-grained data about online transactions. This data lends itself to a variety of applications and services that can be provided to...
Rayid Ghani