Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
RDBMS
biblio
Mathematical Formulation and Implementation of Query Inversion Techniques in RDBMS for Tracking Data Provenance
Submitted by aekwall on Mon, 03/30/2020 - 10:32am
RDBMS
unexpected results
Springs
relational database management system
relational algebra operations
relational algebra
query inversion techniques
Physics
mathematical formulations
mathematical formulation
inversion queries
inverse queries
Data-Intensive Applications
data provenance tracking
data provenance finding
data origin
History
data provenance
Provenance
Flowcharts
relational databases
finance
Databases
database
query processing
Metrics
biology
composability
pubcrawl
Human behavior
Resiliency
biblio
Light Database Encryption Design Utilizing Multicore Processors for Mobile Devices
Submitted by aekwall on Mon, 11/04/2019 - 10:23am
Resiliency
multiprocessing systems
parallel database encryption system
parallel databases
Performance
performance evaluation
pubcrawl
RDBMS
relational database security
relational databases
Multicore processing
Scalability
smart phones
SQLite databases
SQLite RDBMS
SQLite-XTS
storage management
storage security
user sensitive data
XTS encryption
full disk encryption
composability
Cryptography
data confidentiality
Data protection
Databases
device processing resources
embedded devices
embedded systems
encryption
commodity multicore processors
handheld devices
Human behavior
light database encryption design
massive storage systems
Metrics
mobile computing
mobile devices
multicore CPU
multicore computing security
biblio
Towards Modelling Insiders Behaviour as Rare Behaviour to Detect Malicious RDBMS Access
Submitted by aekwall on Mon, 11/04/2019 - 10:23am
Insider Threats
access control mechanisms
and Data mining
anomaly-based Intrusion Detection Systems
application data
data leakage
Database intrusion detection
Database monitoring
detect malicious RDBMS access
relational database security
malicious access
malicious RDBMS accesses
persistent concern
RDBMS
relational database management systems
SQL queries
towards modelling insiders
unauthorized employees
Metrics
authorisation
Big Data
Organizations
Data models
Resiliency
Human behavior
pubcrawl
composability
security of data
query processing
SQL
Training
Data mining
malicious insiders
insider attacks
relational databases
biblio
Adaptive Cache Replacement in Efficiently Querying Semantic Big Data
Submitted by grigby1 on Wed, 01/16/2019 - 1:37pm
knowledge bases querying
web services
triplestore
semantic Big Data querying
relational databases
RDF Caching
RDBMS
query response
query processing
query log
LRU
Linked Data
LFU
least recently used
least frequently used
Big Data
knowledge based systems
forecast method
exponential smoothing
Cache replacement
adaptive cache replacement policy
ACR policy
Web Caching
cache storage
Conferences
Scalability
Resiliency
Metrics
pubcrawl