Sciweavers

1715 search results - page 255 / 343
» Trust and Reputation Systems
Sort
View
SIGMOD
2007
ACM
108views Database» more  SIGMOD 2007»
15 years 10 months ago
Provenance in databases
The provenance of data has recently been recognized as central to the trust one places in data. It is also important to annotation, to data integration and to probabilistic databa...
Peter Buneman, Wang Chiew Tan
PODS
2005
ACM
147views Database» more  PODS 2005»
15 years 10 months ago
Peer data exchange
Abstract. We present a semantics and answer set programs for relational peer data exchange systems. When a peer answers a query, it exchanges data with other peers in order to supp...
Ariel Fuxman, Phokion G. Kolaitis, Renée J....
PERCOM
2007
ACM
15 years 9 months ago
Middleware for Secure Home Access and Control
User adaptive systems in the context of pervasive computing can only unveil their power if based on a generic middleware managing private data and context information in combinati...
Andrés Marín López, Wolfgang ...
EUROSEC
2009
ACM
15 years 4 months ago
Secure 3D graphics for virtual machines
In this paper a new approach to API remoting for GPU virtualisation is described which aims to reduce the amount of trusted code involved in 3D rendering for guest VMs. To achieve...
Christopher Smowton
NCA
2009
IEEE
15 years 4 months ago
Sharing Private Information Across Distributed Databases
—In industries such as healthcare, there is a need to electronically share privacy-sensitive data across distinct organizations. We show how this can be done while allowing organ...
Michael Siegenthaler, Ken Birman