Sciweavers

1403 search results - page 82 / 281
» Security Model for XML Data
Sort
View
DATESO
2010
96views Database» more  DATESO 2010»
15 years 2 months ago
A Framework for Efficient Design, Maintaining, and Evolution of a System of XML Applications
Abstract. The today's applications usually form a system of sub-applications, each being responsible for a particular functionality. Hence, the design and maintenance of such ...
Martin Necaský, Irena Mlýnková...
ACSAC
1999
IEEE
15 years 8 months ago
Security Policy Coordination for Heterogeneous Information Systems
Coordinating security policies in information enclaves is challenging due to their heterogeneity and autonomy. Administrators must reconcile the semantic diversity of data and sec...
John Hale, Pablo Galiasso, Mauricio Papa, Sujeet S...
DIAU
2000
Springer
15 years 8 months ago
On Pseudonymization of Audit Data for Intrusion Detection
In multilaterally secure intrusion detection systems (IDS) anonymity and accountability are potentially conflicting requirements. Since IDS rely on audit data to detect violations...
Joachim Biskup, Ulrich Flegel
EDBT
2006
ACM
117views Database» more  EDBT 2006»
15 years 8 months ago
Model-Independent Schema and Data Translation
Abstract. We describe MIDST, an implementation of the model management operator ModelGen, which translates schemas from one model to another, for example from OO to SQL or from SQL...
Paolo Atzeni, Paolo Cappellari, Philip A. Bernstei...
DOLAP
2005
ACM
15 years 6 months ago
A relevance-extended multi-dimensional model for a data warehouse contextualized with documents
Current data warehouse and OLAP technologies can be applied to analyze the structured data that companies store in their databases. The circumstances that describe the context ass...
Juan Manuel Pérez, Rafael Berlanga Llavori,...