Sciweavers

425 search results - page 62 / 85
» Audit
Sort
View
TES
2001
Springer
13 years 12 months ago
Peer-to-Peer Traced Execution of Composite Services
Abstract. The connectivity generated by the Internet is opening unprecedented opportunities of automating business-to-business collaborations. As a result, organisations of all siz...
Marie-Christine Fauvet, Marlon Dumas, Boualem Bena...
VLDB
2001
ACM
108views Database» more  VLDB 2001»
13 years 12 months ago
Potter's Wheel: An Interactive Data Cleaning System
Cleaning data of errors in structure and content is important for data warehousing and integration. Current solutions for data cleaning involve many iterations of data “auditing...
Vijayshankar Raman, Joseph M. Hellerstein
DASFAA
2010
IEEE
148views Database» more  DASFAA 2010»
13 years 12 months ago
Competitive Privacy: Secure Analysis on Integrated Sequence Data
Sequence data analysis has been extensively studied in the literature. However, most previous work focuses on analyzing sequence data from a single source or party. In many applica...
Raymond Chi-Wing Wong, Eric Lo
ACSAC
1999
IEEE
13 years 12 months ago
Adding Availability to Log Services of Untrusted Machines
Uncorrupted log files are the critical system component for computer forensics in case of intrusion and for real time system monitoring and auditing. Protection from tampering wit...
Arianna Arona, Danilo Bruschi, Emilia Rosti
NDSS
1999
IEEE
13 years 11 months ago
Secure Password-Based Protocol for Downloading a Private Key
We present protocols that allow a user Alice, knowing only her name and password, and not carrying a smart card, to "log in to the network" from a "generic" wo...
Radia J. Perlman, Charlie Kaufman