Sciweavers

167 search results - page 8 / 34
» Optimization of Query Plans in the presence of Access Limita...
Sort
View
SIGMOD
2006
ACM
124views Database» more  SIGMOD 2006»
14 years 7 months ago
Redundancy and information leakage in fine-grained access control
The current SQL standard for access control is coarse grained, in that it grants access to all rows of a table or none. Fine-grained access control, which allows control of access...
Govind Kabra, Ravishankar Ramamurthy, S. Sudarshan
ICDT
2005
ACM
130views Database» more  ICDT 2005»
14 years 1 months ago
Rewriting Queries Using Views with Access Patterns Under Integrity Constraints
We study the problem of rewriting queries using views in the presence of access patterns, integrity constraints, disjunction, and negation. We provide asymptotically optimal algori...
Alin Deutsch, Bertram Ludäscher, Alan Nash
ER
2004
Springer
84views Database» more  ER 2004»
14 years 1 months ago
Modeling Functional Data Sources as Relations
In this paper we present a model of functional access to data that, we argue, is suitable for modeling a class of data repositories characterized by functional access, such as web ...
Simone Santini, Amarnath Gupta
EDBT
2006
ACM
127views Database» more  EDBT 2006»
14 years 7 months ago
Progressive Query Optimization for Federated Queries
Federated queries are regular relational queries accessing data on one or more remote relational or non-relational data sources, possibly combining them with tables stored in the ...
Stephan Ewen, Holger Kache, Volker Markl, Vijaysha...
DBISP2P
2003
Springer
105views Database» more  DBISP2P 2003»
14 years 26 days ago
Distributed Queries and Query Optimization in Schema-Based P2P-Systems
Databases have employed a schema-based approach to store and retrieve structured data for decades. For peer-to-peer (P2P) networks, similar approaches are just beginning to emerge,...
Ingo Brunkhorst, Hadhami Dhraief, Alfons Kemper, W...