Sciweavers

1457 search results - page 58 / 292
» Privacy Challenges for Database Systems
Sort
View
SDMW
2005
Springer
14 years 4 months ago
Experiments with Queries over Encrypted Data Using Secret Sharing
To avoid insider attacks one cannot rely on access control to protect a database scheme. Encrypting the database is a better option. This paper describes a working prototype of an ...
Richard Brinkman, Berry Schoenmakers, Jeroen Doume...
ICDT
2003
ACM
150views Database» more  ICDT 2003»
14 years 4 months ago
Bioinformatics Adventures in Database Research
Informatics has helped launch molecular biology into the genomic era. It appears certain that informatics will remain a major contributor to molecular biology in the post-genome er...
Jinyan Li, See-Kiong Ng, Limsoon Wong
SIGMOD
2007
ACM
150views Database» more  SIGMOD 2007»
14 years 11 months ago
System design issues in sensor databases
In-network sensor query processing systems (ISQPs), or sensor databases, have been developed to acquire, process and aggregate data from wireless sensor networks (WSNs). Because W...
Qiong Luo, Hejun Wu
DPD
2010
158views more  DPD 2010»
13 years 8 months ago
DYFRAM: dynamic fragmentation and replica management in distributed database systems
In distributed database systems, tables are frequently fragmented and replicated over a number of sites in order to reduce network communication costs. How to fragment, when to rep...
Jon Olav Hauglid, Norvald H. Ryeng, Kjetil N&oslas...
EDBT
2008
ACM
136views Database» more  EDBT 2008»
14 years 16 days ago
A New Approach to Modular Database Systems
In this paper we present our approach towards a modularized database management system (DBMS) whose components can be adapted at runtime and show the modularization of a DBMS bene...
Florian Irmert, Michael Daum, Klaus Meyer-Wegener