Sciweavers

726 search results - page 39 / 146
» Securing XML data in third-party distribution systems
Sort
View
ICDE
2008
IEEE
118views Database» more  ICDE 2008»
14 years 9 months ago
XML processing in DHT networks
We study the scalable management of XML data in P2P networks based on distributed hash tables (DHTs). We identify performance limitations in this context, and propose an array of t...
Serge Abiteboul, Ioana Manolescu, Neoklis Polyzoti...
EUROSYS
2007
ACM
14 years 5 months ago
Antiquity: exploiting a secure log for wide-area distributed storage
Antiquity is a wide-area distributed storage system designed to provide a simple storage service for applications like file systems and back-up. The design assumes that all serve...
Hakim Weatherspoon, Patrick R. Eaton, Byung-Gon Ch...
COLCOM
2008
IEEE
14 years 2 months ago
Defending against Attribute-Correlation Attacks in Privacy-Aware Information Brokering
Nowadays, increasing needs for information sharing arise due to extensive collaborations among organizations. Organizations desire to provide data access to their collaborators whi...
Fengjun Li, Bo Luo, Peng Liu, Anna Cinzia Squiccia...
DAGSTUHL
2007
13 years 9 months ago
An XML Framework for Integrating Continuous Queries, Composite Event Detection, and Database Condition Monitoring for Multiple D
Abstract Current, data-driven applications have become more dynamic in nature, with the need to respond to events generated from distributed sources or to react to information extr...
Susan Darling Urban, Suzanne W. Dietrich, Yi Chen
ADC
2009
Springer
134views Database» more  ADC 2009»
14 years 2 months ago
Mobile Information Exchange and Integration: From Query to Application Layer
Due to the popularity of mobile devices, more and more commercial applications have been developed on these devices. While commercial applications are mostly backed by relational ...
Van T. K. Tran, Raymond K. Wong, William K. Cheung...