Sciweavers

19 search results - page 3 / 4
» Control Theory: a Foundational Technique for Self Managing D...
Sort
View
SWS
2004
ACM
13 years 11 months ago
Applying hierarchical and role-based access control to XML documents
W3C Recommendations XML Encryption and XML-Digital Signature can be used to protect the confidentiality of and provide assurances about the integrity of XML documents transmitted...
Jason Crampton
RTCSA
2005
IEEE
13 years 11 months ago
Multi-Versions Data for Improvement of QoS in RTDBS
In current research toward the design of more powerful behavior of RTDBS under unpredictable workloads, different research groups focus their work on QoS (Quality of Service) guar...
Emna Bouazizi, Claude Duvallet, Bruno Sadeg
SIGMOD
2004
ACM
170views Database» more  SIGMOD 2004»
14 years 6 months ago
A Formal Analysis of Information Disclosure in Data Exchange
We perform a theoretical study of the following queryview security problem: given a view V to be published, does V logically disclose information about a confidential query S? The...
Gerome Miklau, Dan Suciu
ICDE
2010
IEEE
178views Database» more  ICDE 2010»
13 years 6 months ago
Autonomic workload execution control using throttling
— Database Management Systems (DBMSs) are often required to simultaneously process multiple diverse workloads while enforcing business policies that govern workload performance. ...
Wendy Powley, Patrick Martin, Mingyi Zhang, Paul B...
ADC
2009
Springer
122views Database» more  ADC 2009»
14 years 12 days ago
What is Required in Business Collaboration?
Access control has been studied for sometime, and there are a number of theories and techniques for handling access control for single or centralised systems; however, unique and ...
Daisy Daiqin He, Michael Compton, Kerry Taylor, Ji...