Sciweavers

574 search results - page 60 / 115
» Responsive Security for Stored Data
Sort
View
SIGMOD
2005
ACM
127views Database» more  SIGMOD 2005»
14 years 7 months ago
Fossilized Index: The Linchpin of Trustworthy Non-Alterable Electronic Records
As critical records are increasingly stored in electronic form, which tends to make for easy destruction and clandestine modification, it is imperative that they be properly manag...
Qingbo Zhu, Windsor W. Hsu
SIGMOD
2007
ACM
166views Database» more  SIGMOD 2007»
14 years 7 months ago
Threats to privacy in the forensic analysis of database systems
The use of any modern computer system leaves unintended traces of expired data and remnants of users' past activities. In this paper, we investigate the unintended persistenc...
Patrick Stahlberg, Gerome Miklau, Brian Neil Levin...
ACSAC
2006
IEEE
14 years 1 months ago
Towards Database Firewall: Mining the Damage Spreading Patterns
Access control and integrity constraints are well known approaches to ensure data integrity in commercial database systems. However, due to operational mistakes, malicious intent ...
Kun Bai, Peng Liu
DASFAA
2010
IEEE
141views Database» more  DASFAA 2010»
14 years 2 months ago
Optimizing Write Performance for Read Optimized Databases
Compression in column-oriented databases has been proven to offer both performance enhancements and reductions in storage consumption. This is especially true for read access as c...
Jens Krüger, Martin Grund, Christian Tinnefel...
ACSAC
2001
IEEE
13 years 11 months ago
The Authorization Service of Tivoli Policy Director
This paper presents the Authorization Service provided by Tivoli Policy Director (PD) and its use by PD family members as well as third-party applications. Policies are defined ov...
Günter Karjoth