Sciweavers

96 search results - page 3 / 20
» On provenance and privacy
Sort
View
BPM
2010
Springer
155views Business» more  BPM 2010»
13 years 6 months ago
PAPEL: A Language and Model for Provenance-Aware Policy Definition and Execution
The processing of data is often restricted by contractual and legal requirements for protecting privacy and IPRs. Policies provide means to control how and by whom data is processe...
Christoph Ringelstein, Steffen Staab
EXPERT
2006
107views more  EXPERT 2006»
13 years 5 months ago
Provenance in Agent-Mediated Healthcare Systems
Agent-oriented cooperation techniques and standardized electronic healthcare record exchange protocols can be used to combine information regarding different facets of a therapy re...
Tamás Kifor, László Zsolt Var...
SEMWEB
2009
Springer
13 years 11 months ago
Coloring RDF Triples to Capture Provenance
Abstract. Recently, the W3C Linking Open Data effort has boosted the publication and inter-linkage of large amounts of RDF datasets on the Semantic Web. Various ontologies and know...
Giorgos Flouris, Irini Fundulaki, Panagiotis Pedia...
IJIEM
2010
171views more  IJIEM 2010»
13 years 3 months ago
eConsent: provenance, use and future role
The use of information technology to manage patient consent is an important emerging area of research in health data management. This paper identifies literature, technological ad...
Sophie Cockcroft
CCS
2010
ACM
13 years 5 months ago
A privacy recommendation wizard for users of social networking sites
Privacy is a huge problem for users of social networking sites. While sites like Facebook allow individual users to personalize fine-grained privacy settings, this has proven quit...
Lujun Fang, Heedo Kim, Kristen LeFevre, Aaron Tami