Integrity and Internal Control in Information Systems VI
暂无分享,去创建一个
[1] Dirk Vermeir,et al. Preferred answer sets for ordered logic programs , 2006, Theory Pract. Log. Program..
[2] Gabriel M. Kuper,et al. A unified constraint model for XML , 2001, WWW '01.
[3] Sushil Jajodia,et al. Flexible support for multiple access control policies , 2001, TODS.
[4] Thomas Eiter,et al. Preferred Answer Sets for Extended Logic Programs , 1999, Artif. Intell..
[5] Georg Gottlob,et al. Complexity and expressive power of logic programming , 1997, Proceedings of Computational Complexity. Twelfth Annual IEEE Conference.
[6] Gio Wiederhold,et al. Value-added Mediation in Large-Scale Information Systems , 1995, DS-6.
[7] Xin He,et al. Scalar aggregation in inconsistent databases , 2003, Theor. Comput. Sci..
[8] Salvatore J. Stolfo,et al. The merge/purge problem for large databases , 1995, SIGMOD '95.
[9] Wolfgang Faber,et al. Declarative problem-solving in DLV , 2001 .
[10] Paris C. Kanellakis,et al. Elements of Relational Database Theory , 1991, Handbook of Theoretical Computer Science, Volume B: Formal Models and Sematics.
[11] Edmund M. Clarke,et al. Model Checking , 1999, Handbook of Automated Reasoning.
[12] Jack Minker,et al. On Indefinite Databases and the Closed World Assumption , 1987, CADE.
[13] Jan Chomicki,et al. On the Computational Complexity of Consistent Query Answers , 2002, ArXiv.
[14] Michael Kifer,et al. Applications of Annotated Predicate Calculus to Querying Inconsistent Databases , 2000, Computational Logic.
[15] Lawrence C. Paulson,et al. The Inductive Approach to Verifying Cryptographic Protocols , 2021, J. Comput. Secur..
[16] Sushil Jajodia,et al. A Multilevel Secure Object- Oriented Data Model , 2006 .
[17] Chiaki Sakama,et al. Prioritized logic programming and its application to commonsense reasoning , 2000, Artif. Intell..
[18] Jennifer Widom,et al. Local verification of global integrity constraints in distributed databases , 1993, SIGMOD '93.
[19] Jan Chomicki,et al. Computing consistent query answers using conflict hypergraphs , 2004, CIKM '04.
[20] Renée J. Miller,et al. Towards Inconsistency Management in Data Integration Systems , 2003, IIWeb.
[21] Marianne Winslett,et al. Reasoning about Action Using a Possible Models Approach , 1988, AAAI.
[22] Kevin J. Sullivan,et al. COM revisited: tool-assisted modelling of an architectural framework , 2000, SIGSOFT '00/FSE-8.
[23] J. Ross Quinlan,et al. Learning decision tree classifiers , 1996, CSUR.
[24] Patrick Valduriez,et al. Design and implementation of an extendible integrity subsystem , 1984, SIGMOD '84.
[25] Brajendra Panda,et al. Analyzing Transaction Logs for Effective Damage Assessment , 2002, DBSec.
[26] Erhard Rahm,et al. Data Cleaning: Problems and Current Approaches , 2000, IEEE Data Eng. Bull..
[27] Kyuseok Shim,et al. Optimizing queries with materialized views , 1995, Proceedings of the Eleventh International Conference on Data Engineering.
[28] Michael Stonebraker,et al. Implementation of integrity constraints and views by query modification , 1975, SIGMOD '75.
[29] Suzanne M. Embury,et al. Increasing the Accuracy of Time-tabled Condition Monitoring , 2002, IICIS.
[30] Gerard J. Holzmann,et al. Design and validation of computer protocols , 1991 .
[31] Andrew William Roscoe,et al. Proving security protocols with model checkers by data independence techniques , 1999 .
[32] Sushil Jajodia,et al. Trusted recovery , 1999, CACM.
[33] Marcos K. Aguilera,et al. Matching events in a content-based subscription system , 1999, PODC '99.
[34] Dennis Shasha,et al. WebFilter: A High-throughput XML-based Publish and Subscribe System , 2001, VLDB.
[35] Jan Chomicki,et al. Consistent Answers from Integrated Data Sources , 2002, FQAS.
[36] Jan Jürjens,et al. Secure systems development with UML , 2004 .
[37] Gavin Lowe,et al. Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR , 1996, Softw. Concepts Tools.
[38] Jeffrey D. Ullman,et al. Information integration using logical views , 1997, Theor. Comput. Sci..
[39] Dennis Shasha,et al. Filtering algorithms and implementation for very fast publish/subscribe systems , 2001, SIGMOD '01.
[40] Paul G. Spirakis,et al. Attack Propagation in Networks , 2003, Theory of Computing Systems.
[41] P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .
[42] Sushil Jajodia,et al. Surviving information warfare attacks on databases , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[43] Mukesh Dalal,et al. Investigations into a Theory of Knowledge Base Revision , 1988, AAAI.
[44] Leopoldo E. Bertossi,et al. Logic Programs for Querying Inconsistent Databases , 2003, PADL.
[45] Dennis Shasha,et al. Declarative Data Cleaning: Language, Model, and Algorithms , 2001, VLDB.
[46] Eric Monteith. Genoa TIE, advanced boundary controller experiment , 2001, Seventeenth Annual Computer Security Applications Conference.
[47] Jan Chomicki,et al. Consistent query answers in inconsistent databases , 1999, PODS '99.
[48] Matt Bishop,et al. Computer Security: Art and Science , 2002 .
[49] Ron van der Meyden,et al. Logical Approaches to Incomplete Information: A Survey , 1998, Logics for Databases and Information Systems.
[50] Jef Wijsen,et al. Condensed Representation of Database Repairs for Consistent Query Answering , 2003, ICDT.
[51] Samuel Madden,et al. Continuously adaptive continuous queries over streams , 2002, SIGMOD '02.
[52] Timo Soininen,et al. Extending and implementing the stable model semantics , 2000, Artif. Intell..
[53] D. E. Bell,et al. Secure Computer Systems : Mathematical Foundations , 2022 .
[54] Fabrizio Sebastiani,et al. Machine learning in automated text categorization , 2001, CSUR.
[55] Joann J. Ordille,et al. Query-Answering Algorithms for Information Agents , 1996, AAAI/IAAI, Vol. 1.
[56] Michael Stonebraker,et al. Monitoring Streams - A New Class of Data Management Applications , 2002, VLDB.
[57] François Bry,et al. Query Answering in Information Systems with Integrity Constraints , 1997, IICIS.
[58] Kenneth L. McMillan,et al. Symbolic model checking: an approach to the state explosion problem , 1992 .
[59] Jeannette M. Wing,et al. A Case study in Model Checking Software Systems , 1997, Sci. Comput. Program..
[60] Latha S. Colby,et al. Algorithms for deferred view maintenance , 1996, SIGMOD '96.
[61] Jan Chomicki,et al. Query Answering in Inconsistent Databases , 2003, Logics for Emerging Applications of Databases.
[62] Jennifer Widom,et al. Implementing Set-Oriented Production Rules as an Extension to Starburst , 1991, VLDB.
[63] Xiaolei Qian,et al. Distribution Design of Integrity Constraints , 1988, Expert Database Conf..
[64] John Grant,et al. Logic-based approach to semantic query optimization , 1990, TODS.
[65] Arnon Rosenthal,et al. Administering Permissions for Distributed Data: Factoring and Automated Inference , 2001, DBSec.
[66] Michael E. Lesk,et al. Automatic sense disambiguation using machine readable dictionaries: how to tell a pine cone from an ice cream cone , 1986, SIGDOC '86.
[67] Alon Y. Halevy,et al. Recursive Query Plans for Data Integration , 2000, J. Log. Program..
[68] Jan Chomicki,et al. Specifying and Querying Database Repairs using Logic Programs with Exceptions , 2000, FQAS.
[69] Michael J. Franklin,et al. Efficient Filtering of XML Documents for Selective Dissemination of Information , 2000, VLDB.
[70] Gabriel M. Kuper,et al. Constraint Databases , 2010, Springer Berlin Heidelberg.
[71] Jan Chomicki,et al. Answer sets for consistent query answering in inconsistent databases , 2002, Theory and Practice of Logic Programming.
[72] Susan Darling Urban,et al. CONTEXT: A CONstrainT EXplanation Tool , 1992, Data Knowl. Eng..
[73] P. Samarati,et al. Access control: principle and practice , 1994, IEEE Communications Magazine.
[74] S.D. Urban,et al. The implementation and evaluation of integrity maintenance rules in an object-oriented database , 1992, [1992] Eighth International Conference on Data Engineering.
[75] Jennifer Widom,et al. Deriving Production Rules for Constraint Maintainance , 1990, VLDB.
[76] Peter G. Neumann,et al. Experience with EMERALD to Date , 1999, Workshop on Intrusion Detection and Network Monitoring.
[77] Susan Darling Urban. ALICE: an assertion language for integrity constraint expression , 1989, [1989] Proceedings of the Thirteenth Annual International Computer Software & Applications Conference.
[78] Jean-Marie Nicolas. Logic for improving integrity checking in relational data bases⋆ , 2004, Acta Informatica.
[80] Jan Jürjens,et al. UMLsec: Extending UML for Secure Systems Development , 2002, UML.
[81] Arnon Rosenthal,et al. Document release versus data access controls: two sides of the same coin? , 2001, CIKM '01.
[82] Raymond Reiter,et al. Towards a Logical Reconstruction of Relational Database Theory , 1982, On Conceptual Modelling.
[83] Jan Chomicki,et al. Minimal-change integrity maintenance using tuple deletions , 2002, Inf. Comput..
[84] Alon Y. Levy. Combining artificial intelligence and databases for data integration , 1999 .
[85] Wenfei Fan,et al. Integrity constraints for XML , 2000, PODS.
[86] Thomas Eiter,et al. Efficient Evaluation of Logic Programs for Querying Data Integration Systems , 2003, ICLP.
[87] Arjeh M. Cohen,et al. Synchronized Multimedia Integration Language (SMIL) 2.0 , 1998 .
[88] Ronald Fagin,et al. Data exchange: semantics and query answering , 2003, Theor. Comput. Sci..
[89] Sergio Greco,et al. Querying Inconsistent Databases , 2000, LPAR.
[90] Maurizio Lenzerini,et al. Source inconsistency and incompleteness in data integration , 2002, KRDB.
[91] Sylvia L. Osborn,et al. Modeling Mandatory Access Control in Role-Based Security Systems , 1995, DBSec.
[92] Maurizio Lenzerini,et al. Data integration: a theoretical perspective , 2002, PODS.
[93] Ramaswamy Chandramouli,et al. The Queen's Guard: A Secure Enforcement of Fine-grained Access Control In Distributed Data Analytics Platforms , 2001, ACM Trans. Inf. Syst. Secur..
[94] Armin B. Cremers,et al. AIM - An Integrity Monitor for the Database System INGRES , 1983, VLDB.
[95] Sergio Greco,et al. A Logic Programming Approach to the Integration, Repairing and Querying of Inconsistent Databases , 2001, ICLP.
[96] David A. Basin,et al. SecureUML: A UML-Based Modeling Language for Model-Driven Security , 2002, UML.
[97] David Notkin,et al. Model checking large software specifications , 1996, SIGSOFT '96.
[98] Carl E. Landwehr,et al. A security model for military message systems , 1984, TOCS.
[99] Solange Ghernaouti-Hélie,et al. Internet et sécurité , 2002 .
[100] Andrea Calì,et al. On the decidability and complexity of query answering over inconsistent and incomplete databases , 2003, PODS.
[101] Leopoldo E. Bertossi,et al. Logic Programs for Consistently Querying Data Integration Systems , 2003, IJCAI.
[102] Jos Warmer,et al. The object constraint language , 1998 .
[103] Gavin Lowe,et al. Towards a completeness result for model checking of security protocols , 1998, Proceedings. 11th IEEE Computer Security Foundations Workshop (Cat. No.98TB100238).
[104] Jarek Gryz,et al. Query Rewriting Using Views in the Presence of Functional and Inclusion Dependencies , 1999, Inf. Syst..
[105] Moshe Y. Vardi. The complexity of relational query languages (Extended Abstract) , 1982, STOC '82.
[106] Gio Wiederhold,et al. Protecting Information when Access is Granted for Collaboration , 2000, DBSec.
[107] Sylvia L. Osborn. Mandatory access control and role-based access control revisited , 1997, RBAC '97.
[108] Solange Ghernaouti-Hélie,et al. Stratégie et ingénierie de la sécurité des réseaux , 1998 .
[109] Serge Abiteboul,et al. Foundations of Databases , 1994 .
[110] Amihai Motro,et al. Multiplex: A Formal Model for Multidatabases and Its Implementation , 1999, NGITS.
[111] Subhasish Mazumdar,et al. Optimizing Distributed Integrity Constraints , 1993, DASFAA.
[112] Peter Gärdenfors,et al. Belief Revision , 1995 .
[113] Suzanne M. Embury,et al. Non-Intrusive Assessment of Organizational Data Quality , 2001, IQ.
[114] John C. Mitchell,et al. Automated analysis of cryptographic protocols using Mur/spl phi/ , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[115] Michael Sipser,et al. Introduction to the Theory of Computation , 1996, SIGA.
[116] Alberto O. Mendelzon,et al. Tableau Techniques for Querying Information Sources through Global Schemas , 1999, ICDT.
[117] Susan Darling Urban,et al. The design of a constraint/rule language for an object-oriented data model , 1995, J. Syst. Softw..
[118] Tore Risch,et al. Distributing semantic constraints between heterogeneous databases , 1997, Proceedings 13th International Conference on Data Engineering.
[119] Michael Gruninger,et al. ONTOLOGY Applications and Design , 2002 .
[121] Yanlei Diao,et al. YFilter: efficient and scalable filtering of XML documents , 2002, Proceedings 18th International Conference on Data Engineering.
[122] Nello Cristianini,et al. An Introduction to Support Vector Machines and Other Kernel-based Learning Methods , 2000 .
[123] Ronald Fagin,et al. Translating Web Data , 2002, VLDB.
[124] Pierre Wolper,et al. Automata theoretic techniques for modal logics of programs: (Extended abstract) , 1984, STOC '84.
[125] John Grant,et al. A logic-based approach to data integration , 2001, Theory and Practice of Logic Programming.
[126] Divesh Srivastava,et al. Answering Queries with Aggregation Using Views , 1996, VLDB.
[127] Ashish Gupta,et al. Partial information based on integrity constraint checking , 1995 .
[128] Catherine A. Meadows,et al. The NRL Protocol Analyzer: An Overview , 1996, J. Log. Program..
[129] Joshua D. Guttman,et al. Information Flow in Operating Systems: Eager Formal Methods , 2003 .
[130] J. Roy,et al. Understanding Web services , 2001 .
[131] Gio Wiederhold,et al. Incremental Recomputation of Active Relational Expressions , 1991, IEEE Trans. Knowl. Data Eng..