Sciweavers

1347 search results - page 141 / 270
» Towards a Secure Data Stream Management System
Sort
View
ADBIS
2006
Springer
160views Database» more  ADBIS 2006»
15 years 6 months ago
Data Ring: Let Us Turn the Net into a Database!
Because of information ubiquity, one observes an important trend towards transferring information management tasks from database systems to networks. We introduce the notion of Da...
Serge Abiteboul, Neoklis Polyzotis
241
Voted
SIGMOD
2007
ACM
144views Database» more  SIGMOD 2007»
16 years 4 months ago
GhostDB: querying visible and hidden data without leaks
Imagine that you have been entrusted with private data, such as corporate product information, sensitive government information, or symptom and treatment information about hospita...
Nicolas Anciaux, Mehdi Benzine, Luc Bouganim, Phil...
154
Voted
VIIP
2001
15 years 6 months ago
Visual Behavior Characterization for Intrusion Detection in Large Scale Systems
This work focuses on the visual representation of relations towards aiding the exploration and analysis of network intrusions. Fundamentally, the visual representations aid an ana...
Robert F. Erbacher
FAST
2011
14 years 8 months ago
Reliably Erasing Data from Flash-Based Solid State Drives
Reliably erasing data from storage media (sanitizing the media) is a critical component of secure data management. While sanitizing entire disks and individual files is well-unde...
Michael Yung Chung Wei, Laura M. Grupp, Frederick ...
135
Voted
EDBT
2004
ACM
132views Database» more  EDBT 2004»
16 years 4 months ago
Query-Customized Rewriting and Deployment of DB-to-XML Mappings
Given the current trend towards application interoperability and XML-based data integration, there is an increasing need for XML interfaces to relational database management system...
Oded Shmueli, George A. Mihaila, Sriram Padmanabha...