The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The disclosure of sensitive data to unauthorized entities is a critical issue for organizations. Timely detection of data leakage is crucial to reduce possible damages. Therefore, breaches should be detected as early as possible, e.g., when data are leaving the database. In this paper, we focus on data leakage detection by monitoring database activities. We present a framework that automatically learns...
Integration of data from heterogeneous data sources is one of several technical challenges during the tunnel construction. BIM and relational database have maken their efforts for tunnel data organization, but they are not qualified for tunnel problem reasoning. This paper proposes a tunnel data organization method driven by Ontology, which is suitable for data reorganization as well as reasoning...
Grid operations rely on monitoring services fed by a multitude of sources. These services provide relevant information about the status of the resources and the quality of the services in the infrastructure. In a Grid, they must disseminate this information across multiple administrative domains and heterogeneous technical platforms to users organized in different virtual organizations. In order to...
Enterprise information management systems deal with management of business information within organizations in order to support decision-making processes or day-to-day operations that require the availability of knowledge. The business information from such systems is typically analyzed using monitoring systems that are designed with traditional data-warehouse and batch ETL (extract, transform and...
Ensuring public security is an important issue for every government, and effective public security depends on the efficiency of criminal justice processes and procedures. The procedures of the criminal justice may be viewed as the upper-, middle-, and down-stream sections of a supply chain. Like their business counterparts, most law enforcement agencies have to deal with logistics, information flow,...
Several vulnerability analysis techniques in web-based applications detect and report on different types of vulnerabilities. However, no single technique provides a generic technology-independent handling of Web-based vulnerabilities. In this paper we present our experience with and experimental exemplification of using the application vulnerability description language (AVDL) to realize a unified...
An important issue to the adoption of any enterprise architectural approach is the availability of tools to support the development, storage, presentation, analysis, improvement and evolution of enterprise architecture representations. As with enterprise architecture methodologies, enterprise architecture tools to support the architectural development process are still emerging. Most important software...
Accelerated by the rapid deployment of distributed systems and the Internet, online collaboration and information sharing are pervasive in enterprise computing environment. With regard to the requirements of online collaboration and information sharing, authentication information needs flexible manipulation to facilitate federation across trust domains. To achieve identity federation for federated...
In recent years, organizations have been shifting focus to their core business competencies, and reducing total cost of ownership (TCO) associated with training and management of their IT infrastructure. In the same motif, organizations are establishing security and survivability frameworks as an integral part of their business strategy so as to provide an acceptable quality-of-service for their clients...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.