Sciweavers

561 search results - page 64 / 113
» Remote Access Security Issues
Sort
View
SIGMOD
2002
ACM
106views Database» more  SIGMOD 2002»
13 years 10 months ago
A Study on the Management of Semantic Transaction for Efficient Data Retrieval
Mobile computing technology is developing rapidly due to the advantages of information access through mobile devices and the need to retrieve information at remote locations. Howe...
Shi-Ming Huang, Irene S. Y. Kwan, Chih-He Li
CCS
2007
ACM
14 years 5 months ago
Trust management services in relational databases
Trust management represents today a promising approach for supporting access control in open environments. While several approaches have been proposed for trust management and sig...
Sabrina De Capitani di Vimercati, Sushil Jajodia, ...
RAID
2010
Springer
13 years 9 months ago
A Data-Centric Approach to Insider Attack Detection in Database Systems
The insider threat against database management systems is a dangerous security problem. Authorized users may abuse legitimate privileges to masquerade as other users or to maliciou...
Sunu Mathew, Michalis Petropoulos, Hung Q. Ngo, Sh...
VLDB
1994
ACM
84views Database» more  VLDB 1994»
14 years 3 months ago
A Transaction Replication Scheme for a Replicated Database with Node Autonomy
Many proposed protocols for replicated databases consider centralized control of each transaction so that given a transaction, some site will monitor the remote data access and tr...
Ada Wai-Chee Fu, David Wai-Lok Cheung
ISSADS
2005
Springer
14 years 4 months ago
Database System Architecture - A Walk Through Time: From Centralized Platform to Mobile Computing - Keynote Address
Classical distributed database systems monolithically offer distribution transparency and higher performance. This is made possible by making data available and closer to the appl...
Ali R. Hurson, Yu Jiao