Sciweavers

7607 search results - page 24 / 1522
» Querying data provenance
Sort
View
ICDCSW
2006
IEEE
14 years 1 months ago
Semantic Data Extraction for B2B Integration
Business-to-business (B2B) data exchange and integration is a common daily operation in today’s organizations. These operations are crucial since they affect organizations’ ca...
Bruno Silva, Jorge Cardoso
ICTAI
2009
IEEE
14 years 2 months ago
Managing Authorization Provenance: A Modal Logic Based Approach
Abstract—In distributed environments, access control decisions depend on statements of multiple agents rather than only one central trusted party. However, existing policy langua...
Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu
HPDC
2010
IEEE
13 years 8 months ago
Mendel: efficiently verifying the lineage of data modified in multiple trust domains
Data is routinely created, disseminated, and processed in distributed systems that span multiple administrative domains. To maintain accountability while the data is transformed b...
Ashish Gehani, Minyoung Kim
FAST
2009
13 years 5 months ago
The Case of the Fake Picasso: Preventing History Forgery with Secure Provenance
As increasing amounts of valuable information are produced and persist digitally, the ability to determine the origin of data becomes important. In science, medicine, commerce, an...
Ragib Hasan, Radu Sion, Marianne Winslett
ITNG
2010
IEEE
13 years 11 months ago
Provenance Collection in Reservoir Management Workflow Environments
There has been a recent push towards applying information technology principles, such as workflows, to bring greater efficiency to reservoir management tasks. These workflows are d...
Fan Sun, Jing Zhao, Karthik Gomadam, Viktor K. Pra...