Sciweavers

58 search results - page 10 / 12
» Rewriting Queries Using Views with Access Patterns Under Int...
Sort
View
ICDE
2007
IEEE
145views Database» more  ICDE 2007»
14 years 10 months ago
Fast Identification of Relational Constraint Violations
Logical constraints, (e.g., 'phone numbers in toronto can have prefixes 416, 647, 905 only'), are ubiquitous in relational databases. Traditional integrity constraints, ...
Amit Chandel, Nick Koudas, Ken Q. Pu, Divesh Sriva...
ESWS
2008
Springer
13 years 10 months ago
A Semantic Web Middleware for Virtual Data Integration on the Web
In this contribution a system is presented, which provides access to distributed data sources using Semantic Web technology. While it was primarily designed for data sharing and sc...
Andreas Langegger, Wolfram Wöß, Martin ...
DEXA
2009
Springer
151views Database» more  DEXA 2009»
14 years 3 months ago
Automatic Extraction of Ontologies Wrapping Relational Data Sources
Describing relational data sources (i.e. databases) by means of ontologies constitutes the foundation of most of the semantic based approaches to data access and integration. In sp...
Lina Lubyte, Sergio Tessaris
PVLDB
2010
151views more  PVLDB 2010»
13 years 7 months ago
Advanced Processing for Ontological Queries
Ontology-based data access is a powerful form of extending database technology, where a classical extensional database (EDB) is enhanced by an ontology that generates new intensio...
Andrea Calì, Georg Gottlob, Andreas Pieris
SACMAT
2009
ACM
14 years 3 months ago
Towards formal security analysis of GTRBAC using timed automata
An access control system is often viewed as a state transition system. Given a set of access control policies, a general safety requirement in such a system is to determine whethe...
Samrat Mondal, Shamik Sural, Vijayalakshmi Atluri