Sciweavers

210 search results - page 18 / 42
» Privacy Preserving Database Generation for Database Applicat...
Sort
View
EDBT
2010
ACM
237views Database» more  EDBT 2010»
15 years 6 months ago
BronzeGate: real-time transactional data obfuscation for GoldenGate
Data privacy laws have appeared recently, such as the HIPAA laws for protecting medical records, and the PCI guidelines for protecting Credit Card information. Data privacy can be...
Shenoda Guirguis, Alok Pareek
71
Voted
EDBTW
2010
Springer
15 years 6 months ago
Quantile-based bootstrap methods to generate continuous synthetic data
To face the increasing demand from users, National Statistical Institutes (NSI) release different information products. The dissemination of this information should be performed ...
Daniela Ichim
ACSAC
2001
IEEE
15 years 3 months ago
Temporal Signatures for Intrusion Detection
We introduce a new method for detecting intrusions based on the temporal behavior of applications. It builds on an existing method of application intrusion detection developed at ...
Anita Jones, Song Li
EDBT
2010
ACM
136views Database» more  EDBT 2010»
15 years 4 months ago
Minimizing database repros using language grammars
Database engines and database-centric applications have become complex software systems. Ensuring bug-free database services is therefore a very difficult task. Whenever possible...
Nicolas Bruno
ACTAC
1998
71views more  ACTAC 1998»
14 years 11 months ago
On the Information Content of Semi-Structured Databases
In a semi-structured database there is no clear separation between the data and the schema, and the degree to which it is structured depends on the application. Semi-structured da...
Mark Levene