Sciweavers

2257 search results - page 395 / 452
» Information accountability
Sort
View
HPDC
2010
IEEE
15 years 27 days ago
Mendel: efficiently verifying the lineage of data modified in multiple trust domains
Data is routinely created, disseminated, and processed in distributed systems that span multiple administrative domains. To maintain accountability while the data is transformed b...
Ashish Gehani, Minyoung Kim
ICFP
2010
ACM
15 years 27 days ago
Security-typed programming within dependently typed programming
Several recent security-typed programming languages, such as Aura, PCML5, and Fine, allow programmers to express and enforce access control and information flow policies. Most of ...
Jamie Morgenstern, Daniel R. Licata
ICDE
2010
IEEE
212views Database» more  ICDE 2010»
15 years 14 hour ago
Cleansing uncertain databases leveraging aggregate constraints
— Emerging uncertain database applications often involve the cleansing (conditioning) of uncertain databases using additional information as new evidence for reducing the uncerta...
Haiquan Chen, Wei-Shinn Ku, Haixun Wang
ICECCS
2010
IEEE
162views Hardware» more  ICECCS 2010»
15 years 14 hour ago
Trust-Based Adaptation in Complex Service-Oriented Systems
Abstract—Complex networks consisting of humans and software services, such as Web-based social and collaborative environments, typically require flexible and context-based inter...
Florian Skopik, Daniel Schall, Schahram Dustdar
AIS
2010
Springer
14 years 12 months ago
Community networks and the evolution of civic intelligence
Although the intrinsic physicality of human beings has not changed in millennia, the species has managed to profoundly reconstitute the physical and social world it inhabits. Alth...
Douglas Schuler