A flexible mandatory access control policy (MAC) for XML databases is presented in this paper. The label type and label access policy can be defined according to the requirements ...
We are interested in the problem of validating the consistency of integrity constraints when data is modi ed. In particular, we consider how constraints can be checked with only p...
Jennifer Widom, Ashish Gupta, Yehoshua Sagiv, Jeff...
A promising technique for protecting privacy and integrity of sensitive data is to statically check information flow within programs that manipulate the data. While previous work...
Abstract Appears in Proceedings of the Thirteenth Symposium on Principles of Database Systems, 1994 Ashish Gupta Yehoshua Sagivy Je rey D. Ullman Jennifer Widom Dept. of Computer S...
Ashish Gupta, Yehoshua Sagiv, Jeffrey D. Ullman, J...
Most machine learning algorithms are designed either for supervised or for unsupervised learning, notably classification and clustering. Practical problems in bioinformatics and i...