-
1
-
-
34547285007
-
The design of the borealis stream processing engine
-
D. J. Abadi, Y. Ahmad, M. Balazinska, U. Çetintemel, M. Cherniack, J. Hwang, W. Lindner, A. Maskey, A. Rasin, E. Ryvkina, N. Tatbul, Y. Xing, and S. B. Zdonik. The Design of the Borealis Stream Processing Engine. In Proc. of the CIDR, pages 277-289, 2005.
-
(2005)
Proc. of the CIDR
, pp. 277-289
-
-
Abadi, D.J.1
Ahmad, Y.2
Balazinska, M.3
Çetintemel, U.4
Cherniack, M.5
Hwang, J.6
Lindner, W.7
Maskey, A.8
Rasin, A.9
Ryvkina, E.10
Tatbul, N.11
Xing, Y.12
Zdonik, S.B.13
-
2
-
-
0008703812
-
-
IEEE Computer Society Press, Los Alamitos, CA, USA, 1st edition
-
M. D. Abrams, S. G. Jajodia, and H. J. Podell, editors. Information Security: An Integrated Collection of Essays. IEEE Computer Society Press, Los Alamitos, CA, USA, 1st edition, 1995.
-
(1995)
Information Security: An Integrated Collection of Essays
-
-
Abrams, M.D.1
Jajodia, S.G.2
Podell, H.J.3
-
3
-
-
33746364223
-
SnoopIB: Interval-based event specification and detection for active databases
-
R. Adaikkalavan and S. Chakravarthy. SnoopIB: Interval-based Event Specification and Detection for Active Databases. DKE, 59(1):139-165, 2006.
-
(2006)
DKE
, vol.59
, Issue.1
, pp. 139-165
-
-
Adaikkalavan, R.1
Chakravarthy, S.2
-
6
-
-
28044469868
-
Stream: The stanford data stream management system
-
A. Arasu, B. Babcock, S. Babu, J. Cieslewicz, M. Datar, K. Ito, R. Motwani, U. Srivastava, and J. Widom. Stream: The Stanford Data Stream Management System. Technical Report 2004-20, Stanford InfoLab, 2004.
-
(2004)
Technical Report 2004-20, Stanford InfoLab
-
-
Arasu, A.1
Babcock, B.2
Babu, S.3
Cieslewicz, J.4
Datar, M.5
Ito, K.6
Motwani, R.7
Srivastava, U.8
Widom, J.9
-
7
-
-
33745289988
-
The CQL continuous query language: Semantic foundations and query execution
-
A. Arasu, S. Babu, and J. Widom. The CQL Continuous Query Language: Semantic Foundations and Query Execution. VLDB Journal, 15(2):121-142, 2006.
-
(2006)
VLDB Journal
, vol.15
, Issue.2
, pp. 121-142
-
-
Arasu, A.1
Babu, S.2
Widom, J.3
-
8
-
-
0036042175
-
Models and issues in data stream systems
-
B. Babcock, S. Babu, M. Datar, R. Motwani, and J. Widom. Models and Issues in Data Stream Systems. In Proc. of the PODS, pages 1-16, 2002.
-
(2002)
Proc. of the PODS
, pp. 1-16
-
-
Babcock, B.1
Babu, S.2
Datar, M.3
Motwani, R.4
Widom, J.5
-
9
-
-
10644281455
-
Retrospective on aurora
-
H. Balakrishnan, M. Balazinska, D. Carney, U. Çetintemel, M. Cherniack, C. Convey, E. Galvez, J. Salz, M. Stonebraker, N. Tatbul, R. Tibbetts, and S. B. Zdonik. Retrospective on Aurora. VLDB Journal: Special Issue on Data Stream Processing, 13(4):370-383, 2004.
-
(2004)
VLDB Journal: Special issue on Data Stream Processing
, vol.13
, Issue.4
, pp. 370-383
-
-
Balakrishnan, H.1
Balazinska, M.2
Carney, D.3
Çetintemel, U.4
Cherniack, M.5
Convey, C.6
Galvez, E.7
Salz, J.8
Stonebraker, M.9
Tatbul, N.10
Tibbetts, R.11
Zdonik, S.B.12
-
10
-
-
0003400251
-
Secure computer system: Unified exposition and MULTICS interpretation
-
rev. 1, The MITRE Corporation, Bedford, MA 01730
-
D. E. Bell and L. J. LaPadula. Secure Computer System: Unified Exposition and MULTICS Interpretation. Technical Report MTR-2997 Rev. 1 and ESD-TR-75-306, rev. 1, The MITRE Corporation, Bedford, MA 01730, 1976.
-
(1976)
Technical Report MTR-2997 Rev. 1 and ESD-TR-75-306
-
-
Bell, D.E.1
LaPadula, L.J.2
-
12
-
-
67649659827
-
ACStream: Enforcing access control over data streams
-
J. Cao, B. Carminati, E. Ferrari, and K. Tan. ACStream: Enforcing Access Control over Data Streams. In Proc. of the ICDE, pages 1495-1498, 2009.
-
(2009)
Proc. of the ICDE
, pp. 1495-1498
-
-
Cao, J.1
Carminati, B.2
Ferrari, E.3
Tan, K.4
-
14
-
-
0037960295
-
Monitoring streams - A new class of data management applications
-
D. Carney, U. Çetintemel, M. Cherniack, C. Convey, S. Lee, G. Seidman, M. Stonebraker, N. Tatbul, and S. B. Zdonik. Monitoring Streams - A New Class of Data Management Applications. In Proc. of the VLDB, pages 215-226, 2002.
-
(2002)
Proc. of the VLDB
, pp. 215-226
-
-
Carney, D.1
Çetintemel, U.2
Cherniack, M.3
Convey, C.4
Lee, S.5
Seidman, G.6
Stonebraker, M.7
Tatbul, N.8
Zdonik, S.B.9
-
15
-
-
57549083455
-
Event and streams: Harnessing and unleashing their synergy
-
S. Chakravarthy and R. Adaikkalavan. Event and Streams: Harnessing and Unleashing Their Synergy. In Proc. of the DEBS, pages 1-12, 2008.
-
(2008)
Proc. of the DEBS
, pp. 1-12
-
-
Chakravarthy, S.1
Adaikkalavan, R.2
-
16
-
-
78651429569
-
Stream data processing: A quality of service perspective modeling, scheduling, load shedding, and complex event processing
-
Springer
-
S. Chakravarthy and Q. Jiang. Stream Data Processing: A Quality of Service Perspective Modeling, Scheduling, Load Shedding, and Complex Event Processing. Advances in Database Systems, Vol. 36. Springer, 2009.
-
(2009)
Advances in Database Systems
, vol.36
-
-
Chakravarthy, S.1
Jiang, Q.2
-
17
-
-
29844443313
-
Scalable distributed stream processing
-
M. Cherniack, H. Balakrishnan, M. Balazinska, D. Carney, U. Çetintemel, Y. Xing, and S. B. Zdonik. Scalable distributed stream processing. In Proc. of the CIDR, 2003.
-
(2003)
Proc. of the CIDR
-
-
Cherniack, M.1
Balakrishnan, H.2
Balazinska, M.3
Carney, D.4
Çetintemel, U.5
Xing, Y.6
Zdonik, S.B.7
-
18
-
-
34548023942
-
Managing the risk of covert information flows in virtual machine systems
-
T. Jaeger, R. Sailer, and Y. Sreenivasan. Managing the Risk of Covert Information Flows in Virtual Machine Systems. In Proc. of the ACM SACMAT, pages 81-90, 2007.
-
(2007)
Proc. of the ACM SACMAT
, pp. 81-90
-
-
Jaeger, T.1
Sailer, R.2
Sreenivasan, Y.3
-
20
-
-
34548019652
-
Securing the borealis data stream engine
-
W. Lindner and J. Meier. Securing the Borealis Data Stream Engine. In IDEAS, pages 137-147, 2006.
-
(2006)
IDEAS
, pp. 137-147
-
-
Lindner, W.1
Meier, J.2
-
21
-
-
70849105916
-
StreamShield: A stream-centric approach towards security and privacy in data stream environments
-
R. V. Nehme, H. Lim, E. Bertino, and E. A. Rundensteiner. StreamShield: A Stream-Centric Approach towards Security and Privacy in Data Stream Environments. In Proc. of the ACM SIGMOD, pages 1027-1030, 2009.
-
(2009)
Proc. of the ACM SIGMOD
, pp. 1027-1030
-
-
Nehme, R.V.1
Lim, H.2
Bertino, E.3
Rundensteiner, E.A.4
-
22
-
-
52649140439
-
A security punctuation framework for enforcing access control on streaming data
-
R. V. Nehme, E. A. Rundensteiner, and E. Bertino. A Security Punctuation Framework for Enforcing Access Control on Streaming Data. In Proc. of the ICDE, pages 406-415, 2008.
-
(2008)
Proc. of the ICDE
, pp. 406-415
-
-
Nehme, R.V.1
Rundensteiner, E.A.2
Bertino, E.3
-
23
-
-
0012551338
-
Lattice-based enforcement of Chinese walls
-
R. Sandhu. Lattice-Based Enforcement of Chinese Walls. Computers & Security, 11(8):753-763, 1992.
-
(1992)
Computers & Security
, vol.11
, Issue.8
, pp. 753-763
-
-
Sandhu, R.1
-
24
-
-
83255173964
-
A practical Chinese wall security model in cloud computing
-
T. Tsai, Y. Chen, H. Huang, P. Huang, and K. Chou. A Practical Chinese Wall Security Model in Cloud Computing. In Proc. of the APNOMS, pages 1-4, 2011.
-
(2011)
Proc. of the APNOMS
, pp. 1-4
-
-
Tsai, T.1
Chen, Y.2
Huang, H.3
Huang, P.4
Chou, K.5
-
25
-
-
79957821947
-
Information flow control in cloud computing
-
R. Wu, G. Ahn, H. Hu, and M. Singhal. Information Flow Control in Cloud Computing. In Proc. of the CollaborateCom, pages 1-7, 2010.
-
(2010)
Proc. of the CollaborateCom
, pp. 1-7
-
-
Wu, R.1
Ahn, G.2
Hu, H.3
Singhal, M.4
-
26
-
-
84866774406
-
A tiered strategy for auditing in the cloud
-
June
-
R. Xie and R. Gamble. A Tiered Strategy for Auditing in the Cloud. In Proc. of IEEE CLOUD, June 2012.
-
(2012)
Proc. of IEEE CLOUD
-
-
Xie, R.1
Gamble, R.2
|