Sciweavers

29 search results - page 5 / 6
» Preventing Information Leaks through Shadow Executions
Sort
View
COOPIS
2002
IEEE
13 years 10 months ago
Parallel Processing with Autonomous Databases in a Cluster System
Abstract. We consider the use of a cluster system for Application Service Provider (ASP). In the ASP context, hosted applications and databases can be update-intensive and must rem...
Stéphane Gançarski, Hubert Naacke, E...
VLDB
1995
ACM
94views Database» more  VLDB 1995»
13 years 9 months ago
Value-cognizant Speculative Concurrency Control
We describe SCC-kS, a Speculative Concurrency Control (SCC) algorithm that allows a DBMS to use efficiently the extra computing resources available in the system to increase the l...
Azer Bestavros, Spyridon Braoudakis
SIGOPS
2008
116views more  SIGOPS 2008»
13 years 5 months ago
Practical techniques for purging deleted data using liveness information
The layered design of the Linux operating system hides the liveness of file system data from the underlying block layers. This lack of liveness information prevents the storage sy...
David Boutcher, Abhishek Chandra
SIGMOD
2012
ACM
220views Database» more  SIGMOD 2012»
11 years 8 months ago
GUPT: privacy preserving data analysis made easy
It is often highly valuable for organizations to have their data analyzed by external agents. However, any program that computes on potentially sensitive data risks leaking inform...
Prashanth Mohan, Abhradeep Thakurta, Elaine Shi, D...
CODES
2006
IEEE
13 years 12 months ago
Methodology for attack on a Java-based PDA
Although mobile Java code is frequently executed on many wireless devices, the susceptibility to electromagnetic (EM) attacks is largely unknown. If analysis of EM waves emanating...
Catherine H. Gebotys, Brian A. White