Sciweavers

481 search results - page 44 / 97
» An Approach to Behavior Sharing in Federated Database System...
Sort
View
CIKM
2005
Springer
15 years 3 months ago
A function-based access control model for XML databases
XML documents are frequently used in applications such as business transactions and medical records involving sensitive information. Typically, parts of documents should be visibl...
Naizhen Qi, Michiharu Kudo, Jussi Myllymaki, Hamid...
DASFAA
2009
IEEE
193views Database» more  DASFAA 2009»
15 years 1 months ago
Encryption over Semi-trusted Database
—Database security has become a vital issue in modern Web applications. Critical business data in databases is an evident target for attack. Therefore, ensuring the confidentiali...
Hasan Kadhem, Toshiyuki Amagasa, Hiroyuki Kitagawa
SIGMOD
2012
ACM
242views Database» more  SIGMOD 2012»
13 years 18 days ago
Dynamic management of resources and workloads for RDBMS in cloud: a control-theoretic approach
As cloud computing environments become explosively popular, dealing with unpredictable changes, uncertainties, and disturbances in both systems and environments turns out to be on...
Pengcheng Xiong
ICDT
2003
ACM
150views Database» more  ICDT 2003»
15 years 3 months ago
Bioinformatics Adventures in Database Research
Informatics has helped launch molecular biology into the genomic era. It appears certain that informatics will remain a major contributor to molecular biology in the post-genome er...
Jinyan Li, See-Kiong Ng, Limsoon Wong
SIGMOD
2008
ACM
182views Database» more  SIGMOD 2008»
15 years 10 months ago
Multi-tenant databases for software as a service: schema-mapping techniques
In the implementation of hosted business services, multiple tenants are often consolidated into the same database to reduce total cost of ownership. Common practice is to map mult...
Stefan Aulbach, Torsten Grust, Dean Jacobs, Alfons...