Sciweavers

101 search results - page 5 / 21
» edbt 2008
Sort
View
EDBT
2008
ACM
142views Database» more  EDBT 2008»
15 years 9 months ago
An access control mechanism for P2P collaborations
We introduce a fine grained access control mechanism for Peer-to-Peer collaborations. It is based on the local access control components of the participants. The peers export thei...
Christoph Sturm, Klaus R. Dittrich, Patrick Ziegle...
EDBT
2008
ACM
130views Database» more  EDBT 2008»
15 years 9 months ago
Self-organizing strategies for a column-store database
Column-store database systems open new vistas for improved maintenance through self-organization. Individual columns are the focal point, which simplify balancing conflicting requ...
Milena Ivanova, Martin L. Kersten, Niels Nes
EDBT
2008
ACM
131views Database» more  EDBT 2008»
15 years 9 months ago
A Bayesian approach for on-line max and min auditing
In this paper we consider the on-line max and min query auditing problem: given a private association between fields in a data set, a sequence of max and min queries that have alr...
Gerardo Canfora, Bice Cavallo
EDBT
2008
ACM
124views Database» more  EDBT 2008»
15 years 9 months ago
An efficient clustering method for k-anonymization
The k-anonymity model is a privacy-preserving approach that has been extensively studied for the past few years. To minimize the information loss due to anonymization, it is cruci...
Jun-Lin Lin, Meng-Cheng Wei
EDBT
2008
ACM
122views Database» more  EDBT 2008»
15 years 9 months ago
Architectural Concerns for Flexible Data Management
Evolving database management systems (DBMS) towards more flexibility in functionality, adaptation to changing requirements, and extensions with new or different components, is a c...
Ionut Emanuel Subasu, Patrick Ziegler, Klaus R. Di...