To effectively support today's global economy, database systems need to store and manipulate text data in multiple languages simultaneously. Current database systems do suppor...
Database outsourcing becomes increasingly attractive as advances in network technologies eliminate the perceived performance difference between in-house databases and outsourced d...
Software has jumped "out of the box" ? it controls critical systems, pervades business and commerce, and infuses entertainment, communication, and other everyday activiti...
This paper evaluates pointer tainting, an incarnation of Dynamic Information Flow Tracking (DIFT), which has recently become an important technique in system security. Pointer tai...
Abstract A Martian who arrived on Earth today would surely conclude that computing and communications security are in a crisis situation. The popular media as well as technical pub...