Sciweavers

1347 search results - page 63 / 270
» Towards a Secure Data Stream Management System
Sort
View
SACMAT
2003
ACM
14 years 29 days ago
Role mining - revealing business roles for security administration using data mining technology
In this paper we describe the work devising a new technique for role-finding to implement Role-Based Security Administration. Our results stem from industrial projects, where larg...
Martin Kuhlmann, Dalia Shohat, Gerhard Schimpf
EDBT
2012
ACM
308views Database» more  EDBT 2012»
11 years 10 months ago
Transactional stream processing
Many stream processing applications require access to a multitude of streaming as well as stored data sources. Yet there is no clear semantics for correct continuous query executi...
Irina Botan, Peter M. Fischer, Donald Kossmann, Ne...
STORAGESS
2006
ACM
14 years 1 months ago
Access control for a replica management database
Distributed computation systems have become an important tool for scientific simulation, and a similarly distributed replica management system may be employed to increase the loc...
Justin M. Wozniak, Paul Brenner, Douglas Thain
KDD
2005
ACM
147views Data Mining» more  KDD 2005»
14 years 1 months ago
Combining proactive and reactive predictions for data streams
Mining data streams is important in both science and commerce. Two major challenges are (1) the data may grow without limit so that it is difficult to retain a long history; and (...
Ying Yang, Xindong Wu, Xingquan Zhu
BIS
2009
112views Business» more  BIS 2009»
13 years 5 months ago
Ontological Mapping of Information Security Best-Practice Guidelines
Abstract. Due to a rapid growth in the use of electronic data processing and networking, an information security management system with a holistic and widespread view becomes more ...
Stefan Fenz, Thomas Pruckner, Arman Manutscheri