Sciweavers

2386 search results - page 116 / 478
» Database Security 2000
Sort
View
DBSEC
2000
95views Database» more  DBSEC 2000»
14 years 11 months ago
Wrappers - a mechanism to support state-based authorisation in Web applications
The premises of this paper are 1) security is application dependent because application semantics directly influence proper protection; but 2) applications are generally too compl...
Martin S. Olivier, Ehud Gudes
CL
2000
Springer
15 years 2 months ago
Querying Inconsistent Databases: Algorithms and Implementation
In this paper, an algorithm for obtaining consistent answers to queries posed to inconsistent relational databases is presented. The algorith is proven to be sound, terminating and...
Alexander Celle, Leopoldo E. Bertossi
DEXA
2000
Springer
127views Database» more  DEXA 2000»
15 years 2 months ago
From Object-Oriented to Aspect-Oriented Databases
Over the recent years aspect-oriented programming (AOP) has found increasing interest among researchers in software engineering. Aspects are ions which capture and localise cross-c...
Awais Rashid, Elke Pulvermüller
FGCS
2000
96views more  FGCS 2000»
14 years 9 months ago
Logicflow execution model for parallel databases
The LOGFLOW parallel Prolog system is similar to the recent parallel database systems concerning its dataflow execution model and its capability of running on othing architectures...
Péter Kacsuk, Norbert Podhorszki
JCSS
2000
92views more  JCSS 2000»
14 years 9 months ago
Querying Spatial Databases via Topological Invariants
The paper investigates the use of topological annotations (called topological invariants) to answer topological queries in spatial databases. The focus is on the translation of to...
Luc Segoufin, Victor Vianu