Learn More
We introduce an auditing framework for determining whether a database system is adhering to its data disclosure policies. Users formulate audit expressions to specify the (sensitive) data subject to disclosure review. An audit component accepts audit expressions and returns all queries (deemed " suspicious ") that accessed the specified data during their(More)
The EPCglobal consortium defines standards to enable data sharing of electronic product code related information within and between enterprises, which typically comprises events of RFID readers as well as product information about the tagged products. An EPC-global network consists of nodes, each of which may have complex data usage and sharing policies and(More)
SQL-based data mining algorithms are rarely used in practice today. Most performance experiments have shown that SQL-based approaches are inferior to main-memory algorithms. Nevertheless, database vendors try to integrate analysis functionalities to some extent into their query execution and optimization components in order to narrow the gap between data(More)
Algorithms for finding frequent itemsets fall into two broad classes: (1) algorithms that are based on non-trivial SQL statements to query and update a database, and (2) algorithms that employ sophisticated in-memory data structures , where the data is stored into and retrieved from flat files. Most performance experiments have shown that SQL-based(More)
Today, it is common that enterprises manage several mostly heterogeneous information systems to supply their production and business processes with data. There is a need to exchange data between the information systems while preserving system autonomy. Hence, an integration approach that relies on a single global enterprise data schema is ruled out. This is(More)