Sciweavers

361 search results - page 50 / 73
» Toward a Query Language for Network Attack Data
Sort
View
DBSEC
2010
162views Database» more  DBSEC 2010»
13 years 9 months ago
Distributed and Secure Access Control in P2P Databases
The intent of peer data management systems (PDMS) is to share as much data as possible. However, in many applications leveraging sensitive data, users demand adequate mechanisms to...
Angela Bonifati, Ruilin Liu, Hui (Wendy) Wang
IWIA
2005
IEEE
14 years 1 months ago
A General Cooperative Intrusion Detection Architecture for MANETs
1 Intrusion detection in MANETs is challenging because these networks change their topologies dynamically; lack concentration points where aggregated traffic can be analyzed; utili...
Daniel F. Sterne, Poornima Balasubramanyam, David ...
KRDB
2003
111views Database» more  KRDB 2003»
13 years 9 months ago
A Framework for Answering Queries using Multiple Representation and Inference Techniques
The Polylog framework is designed to provide a language for efficiently automating complex queries of information represented in multiple formats. A Polylog program contains a set...
Nicholas L. Cassimatis
ESWS
2004
Springer
14 years 1 months ago
Publish/Subscribe for RDF-based P2P Networks
Publish/subscribe systems are an alternative to query based systems in cases where the same information is asked for over and over, and where clients want to get updated answers fo...
Paul-Alexandru Chirita, Stratos Idreos, Manolis Ko...
EXACT
2009
13 years 5 months ago
Towards the Explanation of Workflows
Across many fields involving complex computing, software systems are being augmented with workflow logging functionality. The log data can be effectively organized using declarativ...
James Michaelis, Li Ding, Deborah L. McGuinness