Sciweavers

464 search results - page 41 / 93
» Privacy Engineering for Digital Rights Management Systems
Sort
View
91
Voted
FAST
2009
14 years 10 months ago
The Case of the Fake Picasso: Preventing History Forgery with Secure Provenance
As increasing amounts of valuable information are produced and persist digitally, the ability to determine the origin of data becomes important. In science, medicine, commerce, an...
Ragib Hasan, Radu Sion, Marianne Winslett
97
Voted
CCS
2007
ACM
15 years 6 months ago
Effect of static analysis tools on software security: preliminary investigation
Static analysis tools can handle large-scale software and find thousands of defects. But do they improve software security? We evaluate the effect of static analysis tool use on s...
Vadim Okun, William F. Guthrie, Romain Gaucher, Pa...
IEEEARES
2006
IEEE
15 years 6 months ago
Bayesian Networks Implementation of the Dempster Shafer Theory to Model Reliability Uncertainty
In many reliability studies based on data, reliability engineers face incompleteness and incoherency problems in the data. Probabilistic tools badly handle these kinds of problems...
Christophe Simon, Philippe Weber
188
Voted
SIGMOD
2005
ACM
141views Database» more  SIGMOD 2005»
16 years 20 days ago
XML database support for distributed execution of data-intensive scientific workflows
In this paper we look at the application of XML data management support in scientific data analysis workflows. We describe a software infrastructure that aims to address issues as...
Shannon Hastings, Matheus Ribeiro, Stephen Langell...
105
Voted
CSFW
2004
IEEE
15 years 4 months ago
Cassandra: Flexible Trust Management, Applied to Electronic Health Records
We study the specification of access control policy in large-scale distributed systems. We present Cassandra, a language and system for expressing policy, and the results of a sub...
Moritz Y. Becker, Peter Sewell