2,793 research outputs found
Recommended from our members
A dubiety-determining based model for database cumulated anomaly intrusion
The concept of Cumulated Anomaly (CA), which describes a new type of database anomalies, is addressed. A
typical CA intrusion is that when a user who is authorized to modify data records under certain constraints deliberately
hides his/her intentions to change data beyond constraints in different operations and different transactions. It happens
when some appearing to be authorized and normal transactions lead to certain accumulated results out of given thresholds.
The existing intrusion techniques are unable to deal with CAs. This paper proposes a detection model,
Dubiety-Determining Model (DDM), for Cumulated Anomaly. This model is mainly based on statistical theories and fuzzy
set theories. It measures the dubiety degree, which is presented by a real number between 0 and 1, for each database
transaction, to show the likelihood of a transaction to be intrusive. The algorithms used in the DDM are introduced. A
DDM-based software architecture has been designed and implemented for monitoring database transactions. The
experimental results show that the DDM method is feasible and effective
Statistical and fuzzy approach for database security
A new type of database anomaly is described by
addressing the concept of Cumulated Anomaly in this
paper. Dubiety-Determining Model (DDM), which is a
detection model basing on statistical and fuzzy set
theories for Cumulated Anomaly, is proposed. DDM
can measure the dubiety degree of each database
transaction quantitatively. Software system
architecture to support the DDM for monitoring
database transactions is designed. We also
implemented the system and tested it. Our
experimental results show that the DDM method is
feasible and effective
A flexible mandatory access control policy for XML databases
A flexible mandatory access control policy (MAC) for XML
databases is presented in this paper. The label type and label
access policy can be defined according to the requirements of
applications. In order to preserve the integrity of data in XML
databases, a constraint between a read access rule and a write
access rule in label access policy is introduced. Rules for label
assignment and propagation are proposed to alleviate the
workload of label assignment. Also, a solution for resolving
conflicts of label assignments is proposed. At last, operations for
implementation of the MAC policy in a XML database are
illustrated
Recommended from our members
A practical mandatory access control model for XML databases
A practical mandatory access control (MAC) model for XML databases is presented in this paper. The
label type and label access policy can be defined according to the requirements of different applications. In order to
preserve the integrity of data in XML databases, a constraint between a read-access rule and a write-access rule in
label access policy is introduced. Rules for label assignment and propagation are presented to alleviate the workload
of label assignments. Furthermore, a solution for resolving conflicts in label assignments is proposed. Rules for
update-related operations, rules for exceptional privileges of ordinary users and the administrator are also proposed
to preserve the security of operations in XML databases. The MAC model, we proposed in this study, has been
implemented in an XML database. Test results demonstrated that our approach provides rational and scalable
performance
Recommended from our members
Automatic parsing of sports videos with grammars
Motivated by the analogies between languages and sports videos, we introduce a novel
approach for video parsing with grammars. It utilizes compiler techniques for integrating both semantic
annotation and syntactic analysis to generate a semantic index of events and a table of content for a given
sports video. The video sequence is first segmented and annotated by event detection with domain
knowledge. A grammar-based parser is then used to identify the structure of the video content.
Meanwhile, facilities for error handling are introduced which are particularly useful when the results of
automatic parsing need to be adjusted. As a case study, we have developed a system for video parsing in
the particular domain of TV diving programs. Experimental results indicate the proposed approach is
effectiv
String and M-theory Deformations of Manifolds with Special Holonomy
The R^4-type corrections to ten and eleven dimensional supergravity required
by string and M-theory imply corrections to supersymmetric supergravity
compactifications on manifolds of special holonomy, which deform the metric
away from the original holonomy. Nevertheless, in many such cases, including
Calabi-Yau compactifications of string theory and G_2-compactifications of
M-theory, it has been shown that the deformation preserves supersymmetry
because of associated corrections to the supersymmetry transformation rules,
Here, we consider Spin(7) compactifications in string theory and M-theory, and
a class of non-compact SU(5) backgrounds in M-theory. Supersymmetry survives in
all these cases too, despite the fact that the original special holonomy is
perturbed into general holonomy in each case.Comment: Improved discussion of SU(5) holonomy backgrounds. Other minor typos
corrected. Latex with JHEP3.cls, 42 page
Multiplet Structures of BPS Solitons
There exist simple single-charge and multi-charge BPS p-brane solutions in
the D-dimensional maximal supergravities. From these, one can fill out orbits
in the charge vector space by acting with the global symmetry groups. We give a
classification of these orbits, and the associated cosets that parameterise
them.Comment: Latex, 34 pages, comments and reference adde
- …