Sciweavers

8249 search results - page 99 / 1650
» The DBO database system
Sort
View
FGCN
2007
IEEE
106views Communications» more  FGCN 2007»
14 years 2 months ago
Discovering Methodology and Scenario to Detect Covert Database System
When the digital forensic investigator looks into the suspicious organization including the company, it is important to obtain the data which has the overview of information of th...
Gu Taek Lee, Seokhee Lee, Elena Tsomko, Sangjin Le...
CSREASAM
2009
13 years 9 months ago
A Stochastic Model of the Damage Propagation in Database Systems
Security defense tools like firewalls and antivirus softwares are not sufficient to defend against dynamic threats to database systems. Successful attacks could not only seriously ...
Hai Wang, Su Yan
BTW
2007
Springer
110views Database» more  BTW 2007»
14 years 2 months ago
Melting Pot XML: Bringing File Systems and Databases One Step Closer
: Ever-growing data volumes demand for storage systems beyond current file systems abilities, particularly, a powerful querying capability. With the rise of XML, the database comm...
Alexander Holupirek, Christian Grün, Marc H. ...
XSYM
2004
Springer
161views Database» more  XSYM 2004»
14 years 1 months ago
Adjustable Transaction Isolation in XML Database Management Systems
Processing XML documents in multi-user database management environments requires a suitable storage model of XML data, support of typical XML document processing (XDP) interfaces, ...
Michael Peter Haustein, Theo Härder
CIDR
2007
113views Algorithms» more  CIDR 2007»
13 years 9 months ago
Securing history: Privacy and accountability in database systems
Databases that preserve a historical record of activities and data offer the important benefit of system accountability: past events can be analyzed to detect breaches and maint...
Gerome Miklau, Brian Neil Levine, Patrick Stahlber...