We observed that the Condor batch execution system exposes a lot of information about the jobs that run in the system. This observation led us to explore whether this system infor...
Our research explores a new database extension. Our aim is to see how far it is possible to support collaborative editing and document provenance with database technology, and exte...
Network accountability and forensic analysis have become increasingly important, as a means of performing network diagnostics, identifying malicious nodes, enforcing trust managem...
Several organizations have developed very large market basket databases for the maintenance of customer transactions. New applications, e.g., Web recommendation systems, present th...
Provenance records the history of data. Careless use of provenance may violate the security policies of data. Moreover, the provenance itself may be sensitive information, necessi...