Sciweavers

574 search results - page 9 / 115
» Responsive Security for Stored Data
Sort
View
CCS
2010
ACM
14 years 2 months ago
Secure provenance: the essential of bread and butter of data forensics in cloud computing
Secure provenance that records ownership and process history of data objects is vital to the success of data forensics in cloud computing, yet it is still a challenging issue toda...
Rongxing Lu, Xiaodong Lin, Xiaohui Liang, Xuemin (...
MASCOTS
2010
13 years 9 months ago
RRDtrace: Long-term Raw Network Traffic Recording using Fixed-size Storage
Recording raw network traffic for long-term periods can be extremely beneficial for a multitude of monitoring and security applications. However, storing all traffic of high volume...
Antonis Papadogiannakis, Michalis Polychronakis, E...
VLDB
1994
ACM
84views Database» more  VLDB 1994»
13 years 11 months ago
A Multidatabase System for Tracking and Retrieval of Financial Data
We have built a multidatabase system to support a financial application that stores historical data used by traders to identify trends in the market. The application has an update...
Munir Cochinwala, John Bradley
IEEEIAS
2009
IEEE
14 years 2 months ago
Action-Based Access Control for Web Services
: Web services over the Internet are widely used nowadays. The problem of secure access to Web-based systems is of great importance naturally. Compared with the existing models, th...
FengHua Li, Wei Wang, Jianfeng Ma, Haoxin Su
CAISE
2003
Springer
14 years 22 days ago
A Methodology for the Conceptual Modeling of ETL Processes
Extraction-Transformation-Loading (ETL) tools are pieces of software responsible for the extraction of data from several sources, their cleansing, customization and insertion into ...
Alkis Simitsis, Panos Vassiliadis