Sciweavers

1556 search results - page 34 / 312
» Information Envelope and its Information Integrity Implicati...
Sort
View
FOIKS
2004
Springer
13 years 11 months ago
Simplification of Integrity Constraints for Data Integration
When two or more databases are combined into a global one, integrity may be violated even when each database is consistent with its own local integrity constraints. Efficient metho...
Henning Christiansen, Davide Martinenghi
STACS
1992
Springer
13 years 11 months ago
Secure Commitment Against A Powerful Adversary
abstract Rafail Ostrovskyy Ramarathnam Venkatesanz Moti Yungx Secure commitment is a primitive enabling information hiding, which is one of the most basic tools in cryptography. S...
Rafail Ostrovsky, Ramarathnam Venkatesan, Moti Yun...
POPL
1998
ACM
13 years 12 months ago
The SLam Calculus: Programming with Secrecy and Integrity
The SLam calculus is a typed -calculus that maintains security information as well as type information. The type system propagates security information for each object in four for...
Nevin Heintze, Jon G. Riecke
IFIP
2000
Springer
13 years 11 months ago
Feminist Pedagogy and the Lap Top Computer
ducational Resources Information Center) the on-line education abstracts, show 15,000 entries under "computers and education" since 1992. Adoption of some level of inform...
Paula Chegwidden
CSCW
2006
ACM
13 years 9 months ago
CVS integration with notification and chat: lightweight software team collaboration
Code management systems like Concurrent Version System (CVS) can play an important role in supporting coordination in software development, but often at some time removed from ori...
Geraldine Fitzpatrick, Paul Marshall, Anthony Phil...