以经济学领域本体为例,首先研究SemSORD基本原理和方法,然后提出基于关系数据库关键词检索(Keyword Search over Relational Databases,KSORD)技术实现的关系数据库语义检索模型,并实现相应的原型系统Si-SEEKER,最后提出该领域的研究挑...以经济学领域本体为例,首先研究SemSORD基本原理和方法,然后提出基于关系数据库关键词检索(Keyword Search over Relational Databases,KSORD)技术实现的关系数据库语义检索模型,并实现相应的原型系统Si-SEEKER,最后提出该领域的研究挑战和技术发展趋势.展开更多
A new secured database management system architecture using intrusion detection systems(IDS)is proposed in this paper for organizations with no previous role mapping for users.A simple representation of Structured Que...A new secured database management system architecture using intrusion detection systems(IDS)is proposed in this paper for organizations with no previous role mapping for users.A simple representation of Structured Query Language queries is proposed to easily permit the use of the worked clustering algorithm.A new clustering algorithm that uses a tube search with adaptive memory is applied to database log files to create users’profiles.Then,queries issued for each user are checked against the related user profile using a classifier to determine whether or not each query is malicious.The IDS will stop query execution or report the threat to the responsible person if the query is malicious.A simple classifier based on the Euclidean distance is used and the issued query is transformed to the proposed simple representation using a classifier,where the Euclidean distance between the centers and the profile’s issued query is calculated.A synthetic data set is used for our experimental evaluations.Normal user access behavior in relation to the database is modelled using the data set.The false negative(FN)and false positive(FP)rates are used to compare our proposed algorithm with other methods.The experimental results indicate that our proposed method results in very small FN and FP rates.展开更多
文摘以经济学领域本体为例,首先研究SemSORD基本原理和方法,然后提出基于关系数据库关键词检索(Keyword Search over Relational Databases,KSORD)技术实现的关系数据库语义检索模型,并实现相应的原型系统Si-SEEKER,最后提出该领域的研究挑战和技术发展趋势.
文摘A new secured database management system architecture using intrusion detection systems(IDS)is proposed in this paper for organizations with no previous role mapping for users.A simple representation of Structured Query Language queries is proposed to easily permit the use of the worked clustering algorithm.A new clustering algorithm that uses a tube search with adaptive memory is applied to database log files to create users’profiles.Then,queries issued for each user are checked against the related user profile using a classifier to determine whether or not each query is malicious.The IDS will stop query execution or report the threat to the responsible person if the query is malicious.A simple classifier based on the Euclidean distance is used and the issued query is transformed to the proposed simple representation using a classifier,where the Euclidean distance between the centers and the profile’s issued query is calculated.A synthetic data set is used for our experimental evaluations.Normal user access behavior in relation to the database is modelled using the data set.The false negative(FN)and false positive(FP)rates are used to compare our proposed algorithm with other methods.The experimental results indicate that our proposed method results in very small FN and FP rates.