Abstract. The deployment of Share Data Spaces in open, possibly hostile, environments arises the need of protecting the confidentiality of the data space content. Existing approach...
Giovanni Russello, Changyu Dong, Naranker Dulay, M...
Many scenarios involve merging of two B-tree indexes, both covering the same key range. Increasing demand for continuous availability and high performance requires that such mergi...
Xiaowei Sun, Rui Wang 0002, Betty Salzberg, Chendo...
Abstract. This article presents a proposal for managing privacy in pervasive environments. These environments are capable of sensing personal information anywhere and at anytime. T...
Abraham Esquivel, Pablo A. Haya, Manuel Garc&iacut...
A multidatabase system (MDBS) is a facility that allows users access to data located in multiple autonomous database management systems (DBMSs). In such a system, globaltransaction...
Yuri Breitbart, Hector Garcia-Molina, Abraham Silb...
: - Modern intrusion detection systems are comprised of three basically different approaches, host based, network based, and a third relatively recent addition called procedural ba...