scholarly journals Nash Equilibrium-Based Semantic Cache in Mobile Sensor Grid Database Systems

Author(s):  
Qingfeng Fan ◽  
Karine Zeitouni ◽  
Naixue Xiong ◽  
Qiongli Wu ◽  
Seyit Camtepe ◽  
...  
Author(s):  
Chi-Cheng Chuang ◽  
Yu-Sheng Chiu ◽  
Zhi-Hung Chen ◽  
Hao-Ping Kang ◽  
Che-Rung Lee

2005 ◽  
Vol 1 (1) ◽  
pp. 46 ◽  
Author(s):  
Sushant Goel ◽  
Hema Sharda ◽  
David Taniar

Author(s):  
Krzysztof Kaczmarski ◽  
Piotr Habela ◽  
Hanna Kozankiewicz ◽  
Krzysztof Stencel ◽  
Kazimierz Subieta

1993 ◽  
Vol 32 (04) ◽  
pp. 265-268 ◽  
Author(s):  
D. J. Essin

AbstractLoosely structured documents can capture more relevant information about medical events than is possible using today’s popular databases. In order to realize the full potential of this increased information content, techniques will be required that go beyond the static mapping of stored data into a single, rigid data model. Through intelligent processing, loosely structured documents can become a rich source of detailed data about actual events that can support the wide variety of applications needed to run a health-care organization, document medical care or conduct research. Abstraction and indirection are the means by which dynamic data models and intelligent processing are introduced into database systems. A system designed around loosely structured documents can evolve gracefully while preserving the integrity of the stored data. The ability to identify and locate the information contained within documents offers new opportunities to exchange data that can replace more rigid standards of data interchange.


1979 ◽  
Vol 18 (04) ◽  
pp. 214-222
Author(s):  
K. Sauter

The problems encountered in achieving data security within computer-supported information systems increased with the development of modern computer systems. The threats are manifold and have to be met by an appropriate set of hardware precautions, organizational procedures and software measures which are the topic of this paper. Design principles and software construction rules are treated first, since the security power of a system is considerably determined by its proper design. A number of software techniques presented may support security mechanisms ranging from user identification and authentication to access control, auditing and threat monitoring. Encryption is a powerful tool for protecting data during physical storage and transmission as well.Since an increasing number of health information systems with information-integrating functions are database-supported, the main issues and terms of database systems and their specific security aspects are summarized in the appendix.


Sign in / Sign up

Export Citation Format

Share Document