Sciweavers

14348 search results - page 178 / 2870
» Active Database Systems
Sort
View
FGCN
2007
IEEE
106views Communications» more  FGCN 2007»
15 years 9 months ago
Discovering Methodology and Scenario to Detect Covert Database System
When the digital forensic investigator looks into the suspicious organization including the company, it is important to obtain the data which has the overview of information of th...
Gu Taek Lee, Seokhee Lee, Elena Tsomko, Sangjin Le...
CSREASAM
2009
15 years 4 months ago
A Stochastic Model of the Damage Propagation in Database Systems
Security defense tools like firewalls and antivirus softwares are not sufficient to defend against dynamic threats to database systems. Successful attacks could not only seriously ...
Hai Wang, Su Yan
XSYM
2004
Springer
161views Database» more  XSYM 2004»
15 years 8 months ago
Adjustable Transaction Isolation in XML Database Management Systems
Processing XML documents in multi-user database management environments requires a suitable storage model of XML data, support of typical XML document processing (XDP) interfaces, ...
Michael Peter Haustein, Theo Härder
AMW
2011
14 years 6 months ago
Private Database Synthesis for Outsourced System Evaluation
The goal of this paper is to permit secure outsourced system evaluation. We propose a method for generating synthetic databases and obfuscating a workload of queries in order to pr...
Vani Gupta, Gerome Miklau, Neoklis Polyzotis
NAR
2011
212views Computer Vision» more  NAR 2011»
14 years 6 months ago
Phospho.ELM: a database of phosphorylation sites - update 2011
The Phospho.ELM resource (http://phospho.elm.eu .org) is a relational database designed to store in vivo and in vitro phosphorylation data extracted from the scientific literature...
Holger Dinkel, Claudia Chica, Allegra Via, Cathryn...