Sciweavers

2386 search results - page 111 / 478
» Database Security 2000
Sort
View
CSREASAM
2009
14 years 11 months ago
A Stochastic Model of the Damage Propagation in Database Systems
Security defense tools like firewalls and antivirus softwares are not sufficient to defend against dynamic threats to database systems. Successful attacks could not only seriously ...
Hai Wang, Su Yan
ADC
2000
Springer
82views Database» more  ADC 2000»
15 years 2 months ago
Querying Databases of Annotated Speech
Annotated speech corpora are databases consisting of signal data along with time-aligned symbolic ‘transcriptions’. Such databases are typically multidimensional, heterogeneou...
Steve Cassidy, Steven Bird
ACSAC
2006
IEEE
15 years 4 months ago
Towards Database Firewall: Mining the Damage Spreading Patterns
Access control and integrity constraints are well known approaches to ensure data integrity in commercial database systems. However, due to operational mistakes, malicious intent ...
Kun Bai, Peng Liu
ICDCSW
2005
IEEE
15 years 3 months ago
Integrating Databases with Publish/Subscribe
Publish/subscribe is emerging as an appropriate communication paradigm for large-scale, widely-distributed systems. In this paper, we describe our work on integrating active datab...
Luis Vargas, Jean Bacon, Ken Moody
SAFECOMP
2001
Springer
15 years 2 months ago
Tuning of Database Audits to Improve Scheduled Maintenance in Communication Systems
Abstract. To ensure the consistency of database subsystems involved in communication systems (e.g., telephone systems), appropriate scheduled maintenance policies are necessary. Au...
Stefano Porcarelli, Felicita Di Giandomenico, Amin...