Sciweavers

2492 search results - page 125 / 499
» Ontology-based Database Access
Sort
View
80
Voted
ICISS
2005
Springer
15 years 6 months ago
Event Detection in Multilevel Secure Active Databases
The event-condition-action paradigm (also known as triggers or rules) is a powerful technology. It gives a database “active” capabilities – the ability to react automatically...
Indrakshi Ray, Wei Huang
99
Voted
ICDE
2010
IEEE
241views Database» more  ICDE 2010»
16 years 15 days ago
FlexPref: A Framework for Extensible Preference Evaluation in Database Systems
Personalized database systems give users answers tailored to their personal preferences. While numerous preference evaluation methods for databases have been proposed (e.g., skylin...
Justin J. Levandoski, Mohamed F. Mokbel, Mohamed E...
87
Voted
CCS
2005
ACM
15 years 6 months ago
Obfuscated databases and group privacy
We investigate whether it is possible to encrypt a database and then give it away in such a form that users can still access it, but only in a restricted way. In contrast to conve...
Arvind Narayanan, Vitaly Shmatikov
ER
2006
Springer
158views Database» more  ER 2006»
15 years 4 months ago
Database to Semantic Web Mapping Using RDF Query Languages
One of the main drawbacks of the Semantic Web is the lack of semantically rich data, since most of the information is still stored in relational databases. In this paper, we presen...
Cristian Pérez de Laborda, Stefan Conrad
121
Voted
ICETE
2004
204views Business» more  ICETE 2004»
15 years 2 months ago
A Real-Time Intrusion Prevention System for Commercial Enterprise Databases
: - Modern intrusion detection systems are comprised of three basically different approaches, host based, network based, and a third relatively recent addition called procedural ba...
Ulf T. Mattsson