Sciweavers

161 search results - page 21 / 33
» Secure Databases: An Analysis of Clark-Wilson Model in a Dat...
Sort
View
ESORICS
2009
Springer
14 years 8 months ago
Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing
Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. It moves the application software and databases to the centralized large data centers, whe...
Qian Wang, Cong Wang, Jin Li, Kui Ren, Wenjing Lou
SIGMOD
2011
ACM
299views Database» more  SIGMOD 2011»
12 years 10 months ago
Processing theta-joins using MapReduce
Joins are essential for many data analysis tasks, but are not supported directly by the MapReduce paradigm. While there has been progress on equi-joins, implementation of join alg...
Alper Okcan, Mirek Riedewald
ICPR
2010
IEEE
13 years 6 months ago
Robust ECG Biometrics by Fusing Temporal and Cepstral Information
—The use of vital signs as a biometric is a potentially viable approach in a variety of application scenarios such as security and personalized health care. In this paper, a nove...
Ming Li, Shrikanth Narayanan
ER
2007
Springer
109views Database» more  ER 2007»
13 years 11 months ago
Selfish-brain Theory: Challenges in the Top-down Analysis of Metabolic Supply Chains
The Selfish-brain theory has created the theoretical basis for the systemic analysis of the energy metabolism in terms of a supply chain. The energy in form of glucose equivalents...
Dirk Langemann
MSWIM
2006
ACM
14 years 1 months ago
Ticket-based mobile commerce system and its implementation
Security is a critical issue in mobile commerce, especially in mobile database systems since mobile environments are dynamic and traditional protection mechanisms do not work very...
Hua Wang, Xiaodi Huang, Goutham Reddy Dodda