Sciweavers

1457 search results - page 55 / 292
» Privacy Challenges for Database Systems
Sort
View
RTSS
1995
IEEE
14 years 2 months ago
Managing Contention and Timing Constraints in a Real-Time Database System
Previous work in real-time database management systems (RT-DBMS) has primarily based on simulation. This paper discusses how current real-time technology has been applied to archi...
Matthew R. Lehr, Young-Kuk Kim, Sang Hyuk Son
ACSAC
2007
IEEE
14 years 5 months ago
Database Isolation and Filtering against Data Corruption Attacks
Various attacks (e.g., SQL injections) may corrupt data items in the database systems, which decreases the integrity level of the database. Intrusion detections systems are becomi...
Meng Yu, Wanyu Zang, Peng Liu
HOTOS
2009
IEEE
14 years 2 months ago
Automated Experiment-Driven Management of (Database) Systems
In this position paper, we argue that an important piece of the system administration puzzle has largely been left untouched by researchers. This piece involves mechanisms and pol...
Shivnath Babu, Nedyalko Borisov, Songyun Duan, Her...
CIKM
1994
Springer
14 years 2 months ago
Facilitating Transformations in a Human Genome Project Database
Human Genome Project databases present a confluence of interesting database challenges: rapid schema and data evolution, complex data entry and constraint management, and the need...
Susan B. Davidson, Anthony Kosky, Barbara A. Eckma...
TRUSTBUS
2007
Springer
14 years 4 months ago
The Meaning of Logs
While logging events is becoming increasingly common in computing, in communication and in collaborative environments, log systems need to satisfy increasingly challenging (if not ...
Sandro Etalle, Fabio Massacci, Artsiom Yautsiukhin