Databases Reference
In-Depth Information
23. R. Ananthanarayanan, M. Mohania, A. Gupta, “Management of Conflicting
Obligations in Self-Protecting, Policy-Based Systems,” Second IEEE Interna-
tional Conference on Autonomic Computing , Seattle, Washington, USA, June
2005.
24. E. Bertino, A. Kamra, E. Terzi, A. Vakali, “Intrusion Detection in RBAC-
administered Databases,” Proceedings of the 21st Annual IEEE Computer Se-
curity Applications Conference , Tucson, Arizona, USA, December 2005.
25. H Galhardas, D Florescu, D Shasha, E Simon, “An Extensible Framework for
Data Cleaning.”, Proceedings of the Inter. Conference on Data Engineering ,San
Diego, March, 2000.
26. J. Widom. “Trio: A System for Integrated Management of Data, Accuracy, and
Lineage,” Proceedings of the Second Biennial Conference on Innovative Data
Systems Research (CIDR '05) , Pacific Grove, California, January 2005.
27. President's Information Technology Advisory Committee, “Revolutionizing
Health Care Through Information Technology”. Report to the President of the
United States, June 2004.
Search WWH ::




Custom Search