Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Database systems
biblio
The Research on Material Properties Database System Based on Network Sharing
Submitted by grigby1 on Fri, 03/17/2023 - 12:15pm
Java
Network sharing
material properties
J2EE
intelligent service
data security control
database
relational database security
Database systems
security management
Data visualization
pubcrawl
composability
data acquisition
Access Control
Data models
Software
Resiliency
resilience
Metrics
Human behavior
biblio
Vulnerabilities and Threat Management in Relational Database Management Systems
Submitted by grigby1 on Fri, 03/17/2023 - 12:15pm
Cryptography
relational database management systems
Heart
relational database security
Database systems
SQL injection
SQL
computer security
composability
Access Control
encryption
authentication
Safety
Resiliency
resilience
Metrics
Human behavior
pubcrawl
relational databases
biblio
Property Graph Access Control Using View-Based and Query-Rewriting Approaches
Submitted by grigby1 on Fri, 03/17/2023 - 12:14pm
Big Data
query rewriting
graph database
Ac-cess Control
relational database security
Database systems
Time factors
social networking (online)
composability
relational databases
process control
Access Control
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
Power Grid Data Confirmation Model Based on Behavior Characteristics
Submitted by aekwall on Fri, 05/06/2022 - 12:51pm
behavior control
Cloud Computing
Compositionality
Computational modeling
Data audit
data encryption
Data processing
Database systems
encryption audits
Java
power grids
Predictive Metrics
privacy protection
pubcrawl
Resiliency
Structured Query Language
biblio
An Efficient Database Backup and Recovery Scheme using Write-Ahead Logging
Submitted by grigby1 on Tue, 08/31/2021 - 11:06am
Human behavior
Write-Ahead Logging
Resiliency
resilience
relational database security
pubcrawl
Metrics
Instruction sets
i-o systems security
Cloud Computing
Database systems
database management system
Database Backup and Recovery
Data mining
data management
Conferences
Computer crashes
composability
biblio
Research on Audit Model of Dameng Database based on Security Configuration Baseline
Submitted by aekwall on Tue, 04/27/2021 - 1:27pm
intellectual property security
policy-based governance
composability
Dameng database
database audit model
Database systems
Human behavior
password
pubcrawl
Resiliency
Scalability
Security Audits
security configuration baseline
security management
biblio
Database Security with AES Encryption, Elliptic Curve Encryption and Signature
Submitted by aekwall on Mon, 04/20/2020 - 10:44am
Metrics
elements level encryption
Elliptic curve cryptography
elliptic curve encryption
encryption
Human behavior
information security
integrity
key generator
keys store
malicious threats
element level encryption
PQC
pubcrawl
public key cryptography
relational database security
relational databases
Resiliency
rows level encryption
secure method
word length 256.0 bit
word length 521.0 bit
database information
AES 256 bits random key
AES encryption
collective measures
column level encryption
columns level encryption
composability
confidential data
confidentiality
cryptography techniques
data stores
efficient encryption
database management software
database management systems
Database Security
database signature security
Database systems
digital signatures
ECC encryption
ECC Signature
electronic signatures
biblio
Fast and Efficient Web Caching Methods Regarding the Size and Performance Measures per Data Object
Submitted by grigby1 on Tue, 02/18/2020 - 11:54am
Scalability
optimization
optimum knapsack solutions
performance measures per data object
QoS measures
quality of service
rank exchange caching (REC)
rank exchange caching methods
resilience
Resiliency
object hit ratio
score-gated polling (SGP)
simulative evaluation
TE
Throughput
time 25.0 year
time 50.0 year
traffic engineering
Web Caching
web caching strategies
efficient Web caching methods
5G mobile communication
byte hit ratio
cache content
cache storage
Correlation
CPU caches
data chunk storage
Database systems
delays
pubcrawl
generalized value hit ratio
Greedy-Dual
hit ratio optimization and bounds
independent request model
internet
LFU
LRU
metadata
Metrics
biblio
Fault Tolerance in a Cloud of Databases Environment
Submitted by grigby1 on Thu, 12/28/2017 - 1:28pm
malicious transactions
Wireless communication
transaction-based applications
transaction serialization
transaction processing
transaction
serializability security
serializability
security of data
running transaction continuity
Resiliency
pubcrawl
Monitoring
Cloud Computing
intrusion tolerant scheme
intrusion tolerance
Fault tolerant systems
fault tolerant computing
fault tolerance
disk drives
Database systems
database management systems
database cloud
compromised system
composability
Cloud of databases environment
biblio
Detection of Malicious Transaction in Database Using Log Mining Approach
Submitted by BrandonB on Wed, 05/06/2015 - 2:06pm
Intrusion Detection
Training
SQL
security of data
relational databases
query structures
query database
malicious transaction detection
log mining approach
anomalous database transactions
domain dependency rules
Database systems
Database Security
data sequence rules
Data mining
Computers
automatic discovery
1
2
next ›
last »