Sciweavers

1830 search results - page 1 / 366
» Implementing a Tamper-Evident Database System
Sort
View
ASIAN
2005
Springer
103views Algorithms» more  ASIAN 2005»
13 years 10 months ago
Implementing a Tamper-Evident Database System
Abstract. Data integrity is an assurance that data has not been modified in an unknown or unauthorized manner. The goal of this paper is to allow a user to leverage a small amount...
Gerome Miklau, Dan Suciu
SADFE
2008
IEEE
13 years 11 months ago
Finding the Evidence in Tamper-Evident Logs
Secure logs are powerful tools for building systems that must resist forgery, prove temporal relationships, and stand up to forensic scrutiny. The proofs of order and integrity en...
Daniel Sandler, Kyle Derr, Scott A. Crosby, Dan S....
CI
1999
90views more  CI 1999»
13 years 4 months ago
Efficient Implementation of Semantic Relations in Lexical Databases
In this paper we develop a formalization of semantic relations that facilitates efficient implementations of relations in lexical databases or knowledge representation systems usi...
Uta Priss
VLDB
1994
ACM
96views Database» more  VLDB 1994»
13 years 8 months ago
Implementing Lazy Database Updates for an Object Database System
Current object database management systems support user-defined conversion functions to update the database once the schema has been modified. Two main strategies are possible whe...
Fabrizio Ferrandina, Thorsten Meyer, Roberto Zicar...
DASFAA
1997
IEEE
146views Database» more  DASFAA 1997»
13 years 9 months ago
Implementing Temporal Databases in Object-Oriented Systems
Andreas Steiner, Moira C. Norrie