Sciweavers

637 search results - page 13 / 128
» Inconsistency-Tolerant Integrity Checking
Sort
View
FOIKS
2004
Springer
15 years 1 months ago
Simplification of Integrity Constraints for Data Integration
When two or more databases are combined into a global one, integrity may be violated even when each database is consistent with its own local integrity constraints. Efficient metho...
Henning Christiansen, Davide Martinenghi
APSEC
2009
IEEE
14 years 7 months ago
A Formal Framework to Integrate Timed Security Rules within a TEFSM-Based System Specification
Abstract--Formal methods are very useful in software industry and are becoming of paramount importance in practical engineering techniques. They involve the design and the modeling...
Wissam Mallouli, Amel Mammar, Ana R. Cavalli
STORAGESS
2005
ACM
15 years 3 months ago
Storage-based file system integrity checker
In this paper we present a storage based intrusion detection system (IDS) which uses time and space efficient point-intime copy and performs file system integrity checks to detec...
Mohammad Banikazemi, Dan E. Poff, Bülent Abal...
DBSEC
2010
196views Database» more  DBSEC 2010»
14 years 6 months ago
Preserving Integrity and Confidentiality of a Directed Acyclic Graph Model of Provenance
Abstract. This paper describes how to preserve integrity and confidentiality of a directed acyclic graph (DAG) model of provenance database. We show a method to preserve integrity ...
Amril Syalim, Takashi Nishide, Kouichi Sakurai
RSP
2005
IEEE
162views Control Systems» more  RSP 2005»
15 years 3 months ago
SyCE: An Integrated Environment for System Design in SystemC
We present an integrated system design environment for SystemC, called SyCE. The system consists of several components for efficient analysis, verification and debugging of Syst...
Rolf Drechsler, Görschwin Fey, Christian Genz...