-
1
-
-
84858644601
-
-
March
-
PostgreSQL release notes, v 6.3. Available at: www.postgresql.org/docs/ current/static/release-6-3.html March 1998.
-
(1998)
PostgreSQL Release Notes, V 6.3.
-
-
-
2
-
-
20844435621
-
The lowell database research self-assessment
-
DOI 10.1145/1060710.1060718
-
Serge Abiteboul, Rakesh Agrawal, Phil Bernstein, and et. al. The lowell database research self-assessment. Commun. ACM, 48(5):111-118, 2005. (Pubitemid 40672592)
-
(2005)
Communications of the ACM
, vol.48
, Issue.5
, pp. 111-118
-
-
Abiteboul, S.1
Agrawal, R.2
Bernstein, P.3
Carey, M.4
Ceri, S.5
Croft, B.6
DeWitt, D.7
Franklin, M.8
Molina, H.G.9
Gawlick, D.10
Gray, J.11
Haas, L.12
Halevy, A.13
Hellerstein, J.14
Ioannidis, Y.15
Kersten, M.16
Pazzani, M.17
Lesk, M.18
Maier, D.19
Naughton, J.20
Schek, H.21
Sellis, T.22
Silberschatz, A.23
Stonebraker, M.24
Snodgrass, R.25
Ullman, J.26
Weikum, G.27
Widom, J.28
Zdonik, S.29
more..
-
3
-
-
85134428017
-
Trio: A system for data, uncertainty, and lineage
-
Parag Agrawal, Omar Benjelloun, Anish Das Sarma, Chris Hayworth, Shubha U. Nabar, Tomoe Sugihara, and Jennifer Widom. Trio: A system for data, uncertainty, and lineage. In VLDB, pages 1151-1154, 2006.
-
(2006)
VLDB
, pp. 1151-1154
-
-
Agrawal, P.1
Benjelloun, O.2
Sarma, A.D.3
Hayworth, C.4
Nabar, S.U.5
Sugihara, T.6
Widom, J.7
-
4
-
-
0008724838
-
An authorization model for temporal and derived data: Securing information portals
-
Vijayalakshmi Atluri and Avigdor Gal. An authorization model for temporal and derived data: securing information portals. ACM Trans. Inf. Syst. Secur., 5(1):62-94, 2002.
-
(2002)
ACM Trans. Inf. Syst. Secur.
, vol.5
, Issue.1
, pp. 62-94
-
-
Atluri, V.1
Gal, A.2
-
5
-
-
84860098215
-
-
Berkeley db xml. Available at www.sleepycat.com.
-
Berkeley Db Xml
-
-
-
7
-
-
0030087035
-
A temporal access control mechanism for database systems
-
Elisa Bertino, Claudio Bettini, Elena Ferrari, and Pierangela Samarati. A temporal access control mechanism for database systems. IEEE Transactions on Knowledge and Data Engineering, 8(1):67-80, 1996. (Pubitemid 126774132)
-
(1996)
IEEE Transactions on Knowledge and Data Engineering
, vol.8
, Issue.1
, pp. 67-80
-
-
Bertino, E.1
Bettini, C.2
Ferrari, E.3
Samarati, P.4
-
8
-
-
78449251691
-
A temporal authorization model
-
New York, NY, USA, ACM Press
-
Elisa Bertino, Claudio Bettini, and Pierangela Samarati. A temporal authorization model. In CCS'94: Proceedings of the 2nd ACM Conference on Computer and communications security, pages 126-135, New York, NY, USA, 1994. ACM Press.
-
(1994)
CCS'94: Proceedings of the 2nd ACM Conference on Computer and Communications Security
, pp. 126-135
-
-
Bertino, E.1
Bettini, C.2
Samarati, P.3
-
10
-
-
33846076805
-
Provenance management in curated databases
-
DOI 10.1145/1142473.1142534, SIGMOD 2006 - Proceedings of the ACM SIGMOD International Conference on Management of Data
-
Peter Buneman, Adriane Chapman, and James Cheney. Provenance management in curated databases. In ACM SIGMOD Conference on Management of Data, pages 539-550, New York, NY, USA, 2006. ACM Press. (Pubitemid 46946538)
-
(2006)
Proceedings of the ACM SIGMOD International Conference on Management of Data
, pp. 539-550
-
-
Buneman, P.1
Chapman, A.2
Cheney, J.3
-
19
-
-
85084160792
-
Understanding data lifetime via whole system simulation
-
August
-
Jim Chow, Ben Pfaff, Tal Garfinkel, Kevin Christopher, and Mendel Rosenblum. Understanding Data Lifetime via Whole System Simulation. In Proc. USENIX Security Symposium, August 2004.
-
(2004)
Proc. USENIX Security Symposium
-
-
Chow, J.1
Pfaff, B.2
Garfinkel, T.3
Christopher, K.4
Rosenblum, M.5
-
22
-
-
34047224903
-
-
Encase forensic. Available at www.guidancesoftware.com.
-
Encase Forensic
-
-
-
27
-
-
3042825662
-
Remembrance of data passed: A study of disk sanitization practices
-
Jan/Feb.
-
Simson L. Garfinkel and Abhi Shelat. Remembrance of data passed: A study of disk sanitization practices. IEEE Security and Privacy, Jan/Feb 2003.
-
(2003)
IEEE Security and Privacy
-
-
Garfinkel, S.L.1
Shelat, A.2
-
29
-
-
84858687993
-
Database operating systems: Storage and transactions
-
Jim Gray. Database operating systems: Storage and transactions. Invited Talk, SIGMOD, 2006.
-
(2006)
Invited Talk, SIGMOD
-
-
Gray, J.1
-
30
-
-
31044447422
-
The decline and fall of the enron empire
-
October
-
Tim Grieve. The decline and fall of the enron empire. Salon Magazine, October 2003.
-
(2003)
Salon Magazine
-
-
Grieve, T.1
-
31
-
-
0004610703
-
Secure deletion of data from magnetic and solid-state memory
-
July
-
Peter Gutmann. Secure Deletion of Data from Magnetic and Solid-State Memory. In Proc. USENIX Security Symposium, July 1996.
-
(1996)
Proc. USENIX Security Symposium
-
-
Gutmann, P.1
-
34
-
-
29844433455
-
Immortal db: Transaction time support for sql server
-
David Lomet, Roger Barga, Mohamed Mokbel, German Shegalov, Rui Wang, and Yunyue Zhu. Immortal db: Transaction time support for sql server. In SIGMOD Conference, 2005.
-
(2005)
SIGMOD Conference
-
-
Lomet, D.1
Barga, R.2
Mokbel, M.3
Shegalov, G.4
Wang, R.5
Zhu, Y.6
-
35
-
-
33749644509
-
Transaction time support inside a database engine
-
David Lomet, Roger Barga, Mohamed Mokbel, German Shegalov, Rui Wang, and Yunyue Zhu. Transaction time support inside a database engine. In International Conference on Data Engineering, 2006.
-
(2006)
International Conference on Data Engineering
-
-
Lomet, D.1
Barga, R.2
Mokbel, M.3
Shegalov, G.4
Wang, R.5
Zhu, Y.6
-
36
-
-
0030676111
-
Oblivious data structures: Applications to cryptography
-
Daniele Micciancio. Oblivious data structures: applications to cryptography. In Symposium on Theory of Computing, pages 456-464, 1997.
-
(1997)
Symposium on Theory of Computing
, pp. 456-464
-
-
Micciancio, D.1
-
39
-
-
84858676666
-
-
Oracle flashback technology. Available at www.oracle.com/technology/ deploy/availability/htdocs/FlashbackOverview.htm 2006.
-
(2006)
Oracle Flashback Technology
-
-
-
40
-
-
0029359951
-
Temporal and real-time databases: A survey
-
Gultekin Özsoyoglu and Richard T. Snodgrass. Temporal and real-time databases: A survey. IEEE Trans. Knowl. Data Eng., 7(4):513-532, 1995.
-
(1995)
IEEE Trans. Knowl. Data Eng.
, vol.7
, Issue.4
, pp. 513-532
-
-
Özsoyoglu, G.1
Snodgrass, R.T.2
-
42
-
-
84874283560
-
Secure deletion for a versioning file system
-
December
-
Z. Peterson, R. Burns, J. Herring, A. Stubblefield, and A. Rubin. Secure Deletion for a Versioning File System. In Proc. File And Storage Technologies (FAST), pages 143-154, December 2005.
-
(2005)
Proc. File and Storage Technologies (FAST)
, pp. 143-154
-
-
Peterson, Z.1
Burns, R.2
Herring, J.3
Stubblefield, A.4
Rubin, A.5
-
44
-
-
84858639631
-
The unwanted gaze: The destruction of privacy in America
-
Jeffrey Rosen. The Unwanted Gaze: The destruction of privacy in America. Random House, 2000.
-
(2000)
Random House
-
-
Rosen, J.1
-
45
-
-
35448956436
-
In defense of the delete key
-
James M. Rosenbaum. In defense of the delete key. The Green Bag, 3, 2000.
-
(2000)
The Green Bag
, vol.3
-
-
Rosenbaum, J.M.1
-
46
-
-
84858665248
-
-
Sqlite. Available at www.sqlite.org.
-
Sqlite
-
-
-
48
-
-
84976790810
-
Database systems: Achievements and opportunities
-
Avi Silberschatz, Michael Stonebraker, and Jeff Ullman. Database systems: achievements and opportunities. Commun. ACM, 34(10):110-120, 1991.
-
(1991)
Commun. ACM
, vol.34
, Issue.10
, pp. 110-120
-
-
Silberschatz, A.1
Stonebraker, M.2
Ullman, J.3
-
49
-
-
0002185681
-
Database Research: Achievements and Opportunities into the 21st Century
-
Avi Silberschatz, Mike Stonebraker, and Jeff Ullman. Database research: achievements and opportunities into the 1st century. SIGMOD Rec., 25(1):52-63, 1996. (Pubitemid 126421786)
-
(1996)
SIGMOD Record (ACM Special Interest Group on Management of Data)
, vol.25
, Issue.1
, pp. 52-63
-
-
Silberschatz, A.1
Stonebraker, M.2
Ullman, J.3
-
54
-
-
84858686787
-
VA worker had OK to use data at home
-
June 29
-
Hope Yen. VA worker had OK to use data at home. In Boston Globe, June 29 2006.
-
(2006)
Boston Globe
-
-
Yen, H.1
|