: In many of today's application programs, security functionality is inseparably intertwined with the actual mission-purpose logic. As a result, the trusted code base is unnec...
This paper explores the use of process technology to create formal process models to increase the level of trust that stakeholders have in digital government. Digital Government s...
Lee Osterwil, Norman K. Sondheimer, Anthony Butter...
Social network analysis has recently gained a lot of interest because of the advent and the increasing popularity of social media, such as blogs, social networks, microblogging, o...
Iraklis Varlamis, Magdalini Eirinaki, Malamati D. ...
Assured information sharing among different organizations in a coalitional environment is an important first step in accomplishing many critical tasks. For example, different secur...
Ryan Layfield, Murat Kantarcioglu, Bhavani M. Thur...
For users to trust and interpret the data in scientific digital libraries, they must be able to assess the integrity of those data. Criteria for data integrity vary by context, by ...
Jillian C. Wallis, Christine L. Borgman, Matthew S...