Sciweavers

329 search results - page 13 / 66
» The Dangers of Replication and a Solution
Sort
View
ICPADS
2005
IEEE
15 years 5 months ago
A Pure Lazy Technique for Scalable Transaction Processing in Replicated Databases
Recently, there have been proposals for scaling-up a database system using lazy replication. In these proposals, system scale-up is achieved through the addition of secondary site...
Khuzaima Daudjee, Kenneth Salem
DSN
2000
IEEE
15 years 4 months ago
Implementing e-Transactions with Asynchronous Replication
ts the abstraction of e-Transactions in three-tier architectures. Three-tier architectures are typically Internetoriented architectures, where the end-user interacts with frontend ...
Svend Frølund, Rachid Guerraoui
SRDS
2010
IEEE
14 years 9 months ago
P-Store: Genuine Partial Replication in Wide Area Networks
Partial replication is a way to increase the scalability of replicated systems since updates only need to be applied to a subset of the system's sites, thus allowing replicas...
Nicolas Schiper, Pierre Sutra, Fernando Pedone
DSN
2008
IEEE
15 years 6 months ago
Evaluating email's feasibility for botnet command and control
The usefulness ofemail has been tempered by its role in the widespread distribution ofspam and malicious content. Security solutions have.focused on filtering out malicious payloa...
Kapil Singh, Abhinav Srivastava, Jonathon T. Giffi...
RAID
2010
Springer
14 years 10 months ago
A Data-Centric Approach to Insider Attack Detection in Database Systems
The insider threat against database management systems is a dangerous security problem. Authorized users may abuse legitimate privileges to masquerade as other users or to maliciou...
Sunu Mathew, Michalis Petropoulos, Hung Q. Ngo, Sh...