Sciweavers

1139 search results - page 165 / 228
» Trust Management Survey
Sort
View
VLDB
2007
ACM
187views Database» more  VLDB 2007»
14 years 8 months ago
Secure Data Outsourcing
The networked and increasingly ubiquitous nature of today's data management services mandates assurances to detect and deter malicious or faulty behavior. This is particularly...
Radu Sion
WSDM
2010
ACM
213views Data Mining» more  WSDM 2010»
14 years 5 months ago
Corroborating Information from Disagreeing Views
We consider a set of views stating possibly conflicting facts. Negative facts in the views may come, e.g., from functional dependencies in the underlying database schema. We want ...
Alban Galland, Serge Abiteboul, Amélie Mari...
ACMICEC
2008
ACM
262views ECommerce» more  ACMICEC 2008»
13 years 10 months ago
Preventing information leakage between collaborating organisations
Information sharing and protection against leakage is a critical problem especially for organisations having sensitive information. Sharing content between individuals in the same...
Muntaha Alawneh, Imad M. Abbadi
WWW
2006
ACM
14 years 8 months ago
Geographic locations of web servers
The ccTLD (country code Top Level Domain) in a URL does not necessarily point to the geographic location of the server concerned. The authors have surveyed sample servers belongin...
Katsuko T. Nakahira, Tetsuya Hoshino, Yoshiki Mika...
COMPSAC
2002
IEEE
14 years 1 months ago
On the Business Impact of Software Process Improvement
Organisations that follow the CMM-road towards software process improvement tend to spend large amounts of money and effort. This is certainly the case in the company ING which le...
Rob J. Kusters, Jos J. M. Trienekens, Wilmar Hasso...