Sciweavers

43 search results - page 9 / 9
» Architectures for Intrusion Tolerant Database Systems
Sort
View
ISW
2009
Springer
13 years 12 months ago
F3ildCrypt: End-to-End Protection of Sensitive Information in Web Services
The frequency and severity of a number of recent intrusions involving data theft and leakages has shown that online users’ trust, voluntary or not, in the ability of third partie...
Matthew Burnside, Angelos D. Keromytis
ICNP
2006
IEEE
13 years 11 months ago
High Speed Pattern Matching for Network IDS/IPS
— The phenomenal growth of the Internet in the last decade and society’s increasing dependence on it has brought along, a flood of security attacks on the networking and compu...
Mansoor Alicherry, Muthusrinivasan Muthuprasanna, ...
EDBT
2012
ACM
306views Database» more  EDBT 2012»
11 years 7 months ago
Clydesdale: structured data processing on MapReduce
MapReduce has emerged as a promising architecture for large scale data analytics on commodity clusters. The rapid adoption of Hive, a SQL-like data processing language on Hadoop (...
Tim Kaldewey, Eugene J. Shekita, Sandeep Tata