Sciweavers

730 search results - page 101 / 146
» Modeling trust in collaborative information systems
Sort
View
ISI
2006
Springer
13 years 9 months ago
Database Security Protection Via Inference Detection
Access control mechanisms are commonly used to provide control over who may access sensitive information. However, malicious users can exploit the correlation among the data and in...
Yu Chen, Wesley W. Chu
CAISE
1995
Springer
14 years 27 days ago
Hypertext Version Management in an Actor-based Framework
In this work we discuss a number of issues for the design of hypertext systems in an actor-based model of computation. We examine how the "traditional" basic concepts whi...
Antonina Dattolo, Vincenzo Loia
IAJIT
2010
157views more  IAJIT 2010»
13 years 7 months ago
Fast Cryptographic Privacy Preserving Association Rules Mining on Distributed Homogenous Database
: Privacy is one of the most important properties of an information system must satisfy, in which systems the need to share information among different, not trusted entities, the p...
Ashraf El-Sisi
PERCOM
2004
ACM
14 years 9 months ago
Supporting Persistent Social Groups in Ubiquitous Computing Environments Using Context-Aware Ephemeral Group Service
In this paper, we analyze the role of the social group in a Ubiquitous Computing (Ubicomp) environment as a source of contextual information. A model is presented to address the s...
Bin Wang, John Bodily, Sandeep K. S. Gupta
WWW
2003
ACM
14 years 10 months ago
Service Chart Diagrams - Description & Application
This paper presents an approach for the design and development of service-driven applications. These applications rely on the collaboration of multiple services that businesses of...
Zakaria Maamar, Boualem Benatallah, Wathiq Mansoor