Results 1 - 10
of
2,617,918
Efficient Integrity Checking over XML Documents
"... Abstract. The need for incremental constraint maintenance within collections of semi-structured documents has been ever increasing in the last years due to the widespread diffusion of XML. This problem is addressed here by adapting to the XML data model some constraint verification techniques known ..."
Abstract
- Add to MetaCart
guarantees an efficient integrity checking that combines the advantages of declarativity with incrementality and early detection of inconsistencies. 1
Optimal database locks for efficient integrity checking
- In ADBIS (Local Proceedings
, 2004
"... Abstract. In concurrent database systems, correctness of update transactions refers to the equivalent effects of the execution schedule and some serial schedule over the same set of transactions. Integrity constraints add further semantic requirements to the correctness of the database states reache ..."
Abstract
-
Cited by 1 (1 self)
- Add to MetaCart
reached upon the execution of update transactions. Several methods for efficient integrity checking and enforcing exist. We show in this paper how to apply one such method to automatically extend update transactions with locks and simplified consistency tests on the locked entities. All schedules produced
Efficient integrity checking of untrusted network storage
- In Proc. International Workshop on Storage Security and Survivability (STORAGESS
, 2008
"... Outsourced storage has become more and more practical in recent years. Users can now store large amounts of data in multiple servers at a relatively low price. An important is-sue for outsourced storage systems is to design an efficient scheme to assure users that their data stored at remote servers ..."
Abstract
-
Cited by 10 (1 self)
- Add to MetaCart
Outsourced storage has become more and more practical in recent years. Users can now store large amounts of data in multiple servers at a relatively low price. An important is-sue for outsourced storage systems is to design an efficient scheme to assure users that their data stored at remote
Efficient integrity checking for databases with recursive views
- Ninth East-European Conference on Advances in Databases and Information Systems (ADBIS 05), September 12-15, 2005
"... Abstract. Efficient and incremental maintenance of integrity constraints involving recursive views is a difficult issue that has received some attention in the past years, but for which no widely accepted solution exists yet. In this paper a technique is proposed for compiling such integrity constra ..."
Abstract
-
Cited by 3 (2 self)
- Add to MetaCart
constraints into incremental and optimized tests specialized for given update patterns. These tests may involve the introduction of new views, but for relevant cases of recursion, simplified integrity constraints are obtained that can be checked more efficiently than the original ones and without auxiliary
Efficient integrity checking technique for securing client data in cloud computing
"... Abstract: It has been widely observed that the concept of cloud computing is become one of major theory in the world of IT industry. It involves storing the user's data to be able to use the applications and services that the clouds introduce. There is a significant numbers of risks can be occu ..."
Abstract
-
Cited by 4 (0 self)
- Add to MetaCart
for the integrity checking over the cloud computing with the support of the TPA using digital signature technique. The proposed model result was shown efficiently with a number of situations that performed by unauthorized attackers. The checking done over two parts the CSP and TPA, without giving any secure data
Model Checking Programs
, 2003
"... The majority of work carried out in the formal methods community throughout the last three decades has (for good reasons) been devoted to special languages designed to make it easier to experiment with mechanized formal methods such as theorem provers, proof checkers and model checkers. In this pape ..."
Abstract
-
Cited by 583 (63 self)
- Add to MetaCart
environment for Java, called Java PathFinder (JPF), which integrates model checking, program analysis and testing. Part of this work has consisted of building a new Java Virtual Machine that interprets Java bytecode. JPF uses state compression to handle big states, and partial order and symmetry reduction
Iris: A scalable cloud file system with efficient integrity checks. Cryptology ePrint Archive, Report 2011/585
, 2011
"... We present Iris, a practical, authenticated file system designed to support workloads from large enterprises storing data in the cloud and be resilient against potentially untrustworthy service providers. As a transparent layer enforcing strong integrity guarantees, Iris lets an enterprise tenant ma ..."
Abstract
-
Cited by 20 (2 self)
- Add to MetaCart
We present Iris, a practical, authenticated file system designed to support workloads from large enterprises storing data in the cloud and be resilient against potentially untrustworthy service providers. As a transparent layer enforcing strong integrity guarantees, Iris lets an enterprise tenant
Symbolic Model Checking without BDDs
, 1999
"... Symbolic Model Checking [3, 14] has proven to be a powerful technique for the verification of reactive systems. BDDs [2] have traditionally been used as a symbolic representation of the system. In this paper we show how boolean decision procedures, like Stalmarck's Method [16] or the Davis ..."
Abstract
-
Cited by 910 (74 self)
- Add to MetaCart
Symbolic Model Checking [3, 14] has proven to be a powerful technique for the verification of reactive systems. BDDs [2] have traditionally been used as a symbolic representation of the system. In this paper we show how boolean decision procedures, like Stalmarck's Method [16] or the Davis
Efficient semantic matching
, 2004
"... We think of Match as an operator which takes two graph-like structures and produces a mapping between semantically related nodes. We concentrate on classifications with tree structures. In semantic matching, correspondences are discovered by translating the natural language labels of nodes into prop ..."
Abstract
-
Cited by 817 (67 self)
- Add to MetaCart
We think of Match as an operator which takes two graph-like structures and produces a mapping between semantically related nodes. We concentrate on classifications with tree structures. In semantic matching, correspondences are discovered by translating the natural language labels of nodes into propositional formulas, and by codifying matching into a propositional unsatisfiability problem. We distinguish between problems with conjunctive formulas and problems with disjunctive formulas, and present various optimizations. For instance, we propose a linear time algorithm which solves the first class of problems. According to the tests we have done so far, the optimizations substantially improve the time performance of the system.
Symbolic Model Checking: 10^20 States and Beyond
, 1992
"... Many different methods have been devised for automatically verifying finite state systems by examining state-graph models of system behavior. These methods all depend on decision procedures that explicitly represent the state space using a list or a table that grows in proportion to the number of st ..."
Abstract
-
Cited by 753 (40 self)
- Add to MetaCart
Binary Decision Diagrams (Bryant, R. E., 1986, IEEE Trans. Comput. C-35) to represent relations and formulas. We then show how our new Mu-Calculus model checking algorithm can be used to derive efficient decision procedures for CTL model checking, satistiability of linear-time temporal logic formulas
Results 1 - 10
of
2,617,918