2008 The Ninth International Conference on Web-Age Information Management最新文献

筛选
英文 中文
Research on Malicious Transaction Processing Method of Database System 数据库系统恶意事务处理方法研究
2008 The Ninth International Conference on Web-Age Information Management Pub Date : 2008-07-20 DOI: 10.1109/WAIM.2008.27
Chi Chen, D. Feng, Min Zhang, De-sheng Zhang, He-qun Xian
{"title":"Research on Malicious Transaction Processing Method of Database System","authors":"Chi Chen, D. Feng, Min Zhang, De-sheng Zhang, He-qun Xian","doi":"10.1109/WAIM.2008.27","DOIUrl":"https://doi.org/10.1109/WAIM.2008.27","url":null,"abstract":"Recovery from information attacks is difficult because DBMS is not designed to deal with malicious committed transactions. A few existing methods developed for this purpose rely on operation logs, which can't express the dependency between different transactions directly. These methods usually use rollback mechanism and abandon results of innocent transactions to maintain correctness, which may indeed be used as an approach to realize DOS attack. Hence, it's necessary to find out the malicious transaction and subsequent transactions depending on it precisely. In this paper, the definition of transaction recovery log is presented and each log item records the actions taken in one transaction, by which, we can calculate transactions' dependency directly. Based on the log model and the algorithm for log's creation, the dependency calculation and data recovery algorithm are studied, which are proofed to be complete and correct. Using transaction recovery log and the algorithm, database system can significantly enhance the performance of recovery for defensive information warfare.","PeriodicalId":217119,"journal":{"name":"2008 The Ninth International Conference on Web-Age Information Management","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116682691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
REC: A Novel Model to Rank Experts in Communities REC:一种新的社区专家排名模型
2008 The Ninth International Conference on Web-Age Information Management Pub Date : 2008-07-20 DOI: 10.1109/WAIM.2008.103
Chen Lin, Haofeng Zhou, Zhenhua Huang, Wei Wang
{"title":"REC: A Novel Model to Rank Experts in Communities","authors":"Chen Lin, Haofeng Zhou, Zhenhua Huang, Wei Wang","doi":"10.1109/WAIM.2008.103","DOIUrl":"https://doi.org/10.1109/WAIM.2008.103","url":null,"abstract":"It is an important issue to get support from experts in our daily life. Expert finding is challenging. In previous commercial and academic systems, the users may not get what they expect. In this contribution, we address the problem of finding experts in communities. A novel model REC is presented to solve the expert finding problem in dynamic environment. The model ranks experts by textural and social information. Starting with the most familiar communities, the expert seeker may find appropriate experts, by considering both their local rankings in each community and the difficulty to get their help. Experiments are done on real data sets, including DBLP data set and W3C corpora. Compared with other existing methods, REC achieves promising results. It demonstrates the model's competencies in various search applications.","PeriodicalId":217119,"journal":{"name":"2008 The Ninth International Conference on Web-Age Information Management","volume":"3 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120985949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Scientific Workflow Provenance Querying with Security Views 安全视图下的科学工作流来源查询
2008 The Ninth International Conference on Web-Age Information Management Pub Date : 2008-07-20 DOI: 10.1109/WAIM.2008.41
Artem Chebotko, Seunghan Chang, Shiyong Lu, F. Fotouhi, Ping Yang
{"title":"Scientific Workflow Provenance Querying with Security Views","authors":"Artem Chebotko, Seunghan Chang, Shiyong Lu, F. Fotouhi, Ping Yang","doi":"10.1109/WAIM.2008.41","DOIUrl":"https://doi.org/10.1109/WAIM.2008.41","url":null,"abstract":"Provenance, the metadata that pertains to the derivation history of a data product, has become increasingly important in scientific workflow environments. In many cases, both data products and their provenance can be sensitive and effective access control mechanisms are essential to protect their confidentiality. In this paper, we propose i) a formalization of scientific workflow provenance as the basis for querying and access control; ii) a security specification mechanism for provenance at various granularity levels and the derivation of a full security specification based on inheritance, overriding, and conflict resolution rules; iii) a formalization of security views that are derived from a scientific workflow run provenance for different roles of users; and iv) a framework that integrates abstraction views and security views such that a user can examine provenance at different abstraction levels while respecting the security policy prescribed for her. We have developed the SecProv prototype to validate the effectiveness of our approach.","PeriodicalId":217119,"journal":{"name":"2008 The Ninth International Conference on Web-Age Information Management","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127147179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 54
Automatic Web Query Classification Using Large Unlabeled Web Pages 使用大型未标记网页的自动Web查询分类
2008 The Ninth International Conference on Web-Age Information Management Pub Date : 2008-07-20 DOI: 10.1109/WAIM.2008.91
Jingbo Yu, Na Ye
{"title":"Automatic Web Query Classification Using Large Unlabeled Web Pages","authors":"Jingbo Yu, Na Ye","doi":"10.1109/WAIM.2008.91","DOIUrl":"https://doi.org/10.1109/WAIM.2008.91","url":null,"abstract":"In this paper, a novel and simple method is employed to automatically construct domain knowledge base for query classification from large-scale Web pages. Besides, using context as the feature of words, the resource of relevant words is built automatically in order to extend the user's query. On the basis of domain knowledge base and extension of the query using relevant words, satisfactory performance in query classification is achieved. Experimental results demonstrate that our method achieves precision of 77.68% and recall of 75.34% in Chinese query classification. In English experiments, in spite of the scarcity of English Web pages and absence of stemming, precision achieves 58.83% and recall achieves 54.13%, which is a great improvement compared to state-of-the-art query classification algorithms.","PeriodicalId":217119,"journal":{"name":"2008 The Ninth International Conference on Web-Age Information Management","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124952589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A New Approach for Detecting Anonymity of Patterns 一种新的模式匿名性检测方法
2008 The Ninth International Conference on Web-Age Information Management Pub Date : 2008-07-20 DOI: 10.1109/WAIM.2008.81
Zhihui Wang, Wei Wang, Baile Shi
{"title":"A New Approach for Detecting Anonymity of Patterns","authors":"Zhihui Wang, Wei Wang, Baile Shi","doi":"10.1109/WAIM.2008.81","DOIUrl":"https://doi.org/10.1109/WAIM.2008.81","url":null,"abstract":"Information sharing becomes more frequently and easily than before. However, it also brings serious threats towards individual's privacy. It is no doubt that sharing personal data can cause privacy breaches. Moreover, sharing the knowledge discovered by data mining may also pose threats to personal privacy. In this paper, we consider the anonymity of patterns derived from the result of frequent itemset mining. A new projection-based approach for detecting anonymity of patterns is presented. We prove that the approach can detect all the maximal inference channels for non-k-anonymous patterns. The experimental results show that our approach is more efficient than previous work especially when the number of closed frequent itemsets in the mining result is close to or larger than the number of transactions in a database.","PeriodicalId":217119,"journal":{"name":"2008 The Ninth International Conference on Web-Age Information Management","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126955509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Approximate Validity of XML Streaming Data XML流数据的近似有效性
2008 The Ninth International Conference on Web-Age Information Management Pub Date : 2008-07-20 DOI: 10.1109/WAIM.2008.97
Huang Cheng, Li Jun, M. D. Rougemont
{"title":"Approximate Validity of XML Streaming Data","authors":"Huang Cheng, Li Jun, M. D. Rougemont","doi":"10.1109/WAIM.2008.97","DOIUrl":"https://doi.org/10.1109/WAIM.2008.97","url":null,"abstract":"We present a SAX implementation of the statistical embedding associated with XML data, introduced in [1], [2], which allows to efficiently decide eps-validity to any DTD or Schema, for the Edit Distance with Moves. It associates a generalized k-gram to unranked labelled trees (with k = 1/epsiv) from which any regular property can be approximately decided. We show how to exactly compute the k-gram with a SAX implementation using a memory of size d, the depth of the tree, and an approximate k-gram with queues of size M = 2k and a global memory of size 2k in the worst-case. Experiments on large XML files from the XML benchmark project confirm the error analysis for various values of M.","PeriodicalId":217119,"journal":{"name":"2008 The Ninth International Conference on Web-Age Information Management","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121923589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Network Dynamic Risk Assessment Based on the Threat Stream Analysis 基于威胁流分析的网络动态风险评估
2008 The Ninth International Conference on Web-Age Information Management Pub Date : 2008-07-20 DOI: 10.1109/WAIM.2008.65
Wencong Cheng, Xishan Xu, Yan Jia, Peng Zou
{"title":"Network Dynamic Risk Assessment Based on the Threat Stream Analysis","authors":"Wencong Cheng, Xishan Xu, Yan Jia, Peng Zou","doi":"10.1109/WAIM.2008.65","DOIUrl":"https://doi.org/10.1109/WAIM.2008.65","url":null,"abstract":"This paper considers the problem of the dynamic risk assessment for the network based on the threat stream analysis. We analyze the general approach to do the network dynamic risk assessment. A stream based cube model is built to analyze the characteristics of the threat stream. Then combining with the research about the description and analysis of the threat effect, we propose the architecture of the network dynamic risk assessment.","PeriodicalId":217119,"journal":{"name":"2008 The Ninth International Conference on Web-Age Information Management","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129502356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
COCA: More Accurate Multidimensional Histograms out of More Accurate Correlations Detection COCA:从更精确的相关性检测中得到更精确的多维直方图
2008 The Ninth International Conference on Web-Age Information Management Pub Date : 2008-07-20 DOI: 10.1109/WAIM.2008.21
Wei Cao, Xiongpai Qin, Shan Wang
{"title":"COCA: More Accurate Multidimensional Histograms out of More Accurate Correlations Detection","authors":"Wei Cao, Xiongpai Qin, Shan Wang","doi":"10.1109/WAIM.2008.21","DOIUrl":"https://doi.org/10.1109/WAIM.2008.21","url":null,"abstract":"Detecting and exploiting correlations among columns in relational databases are of great value for query optimizers to generate better query execution plans (QEPs). We propose a more robust and informative metric, namely, entropy correlation coefficients, other than chi-square test to detect correlations among columns in large datasets. We introduce a novel yet simple kind of multi-dimensional synopses named COCA-Hist to cope with different correlations in databases. With the aid of the precise metric of entropy correlation coefficients, correlations of various degrees can be detected effectively; when correlation coefficients testify to mutual independence among columns, the AVI (attribute value independence) assumption can be adopted undoubtedly. COCA can also serve as a data-mining tool with superior qualities as CORDS does. We demonstrate the effectiveness and accuracy of our approach by several experiments.","PeriodicalId":217119,"journal":{"name":"2008 The Ninth International Conference on Web-Age Information Management","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128308345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A New-Style Domain Integrating Management of Windows and UNIX 一种集成Windows和UNIX的新型域管理
2008 The Ninth International Conference on Web-Age Information Management Pub Date : 2008-07-20 DOI: 10.1109/WAIM.2008.36
Shengli Liu, Wenbing Wang, Yuefei Zhu
{"title":"A New-Style Domain Integrating Management of Windows and UNIX","authors":"Shengli Liu, Wenbing Wang, Yuefei Zhu","doi":"10.1109/WAIM.2008.36","DOIUrl":"https://doi.org/10.1109/WAIM.2008.36","url":null,"abstract":"With the broad application of UNIX and its descendants in recent years, heterogeneous network environment is a must to maximize the enterprise's freedom of choice. However, because of different accounts formats and authentication mechanisms of various operating system (OS), heterogeneous network environment also increases difficulties for system management and security implementation. Facing the situation, this paper proposes a HSMD (heterogeneous system management domain) domain to embody both Windows and UNIX. The domain is based on lightweight directory access protocol (LDAP) to solve the conflict in account storing modes of different OS and realizes interoperation between Microsoft extended Kerberos protocol and standard Kerberos protocol. At last, the paper states that the scheme proposed has advantages of security, reliability, flexibility and adaptability.","PeriodicalId":217119,"journal":{"name":"2008 The Ninth International Conference on Web-Age Information Management","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128461577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Evaluation of a Stream of Top-N Selection Queries in Relational Databases 关系型数据库中Top-N选择查询流的求值
2008 The Ninth International Conference on Web-Age Information Management Pub Date : 2008-07-20 DOI: 10.1109/WAIM.2008.19
Liang Zhu, Chunnian Liu, Yanchao Feng, Shenda Ji
{"title":"Evaluation of a Stream of Top-N Selection Queries in Relational Databases","authors":"Liang Zhu, Chunnian Liu, Yanchao Feng, Shenda Ji","doi":"10.1109/WAIM.2008.19","DOIUrl":"https://doi.org/10.1109/WAIM.2008.19","url":null,"abstract":"In relational databases and their applications, an important issue is to evaluate a stream of top-N selection queries. For this issue, we propose a new method with learning-based strategies and region clustering techniques in this paper. This method uses a knowledge base to store related information of some past queries, groups the search regions of the past queries into larger regions and retrieves the tuples from the larger regions. To answer a newly submitted query, our method tries to obtain most results from the previously retrieved tuples that are still in main memory. Thus, this method seeks to minimize the response time by reducing the search regions or avoiding accesses to the underlying databases. Extensive experiments are carried out to measure the performance of this new strategy and the results indicate that it is significantly better than the naive method for both low-dimensional and high-dimensional data.","PeriodicalId":217119,"journal":{"name":"2008 The Ninth International Conference on Web-Age Information Management","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123809841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信