Sciweavers

2022 search results - page 249 / 405
» Trust in Multi-Agent Systems
Sort
View
SIGMOD
2004
ACM
116views Database» more  SIGMOD 2004»
14 years 9 months ago
The Role of Cryptography in Database Security
In traditional database security research, the database is usually assumed to be trustworthy. Under this assumption, the goal is to achieve security against external attacks (e.g....
Ueli M. Maurer
DASFAA
2009
IEEE
151views Database» more  DASFAA 2009»
14 years 4 months ago
The Challenge of Assuring Data Trustworthiness
Abstract. With the increased need of data sharing among multiple organizations, such as government organizations, financial corporations, medical hospitals and academic institution...
Elisa Bertino, Chenyun Dai, Murat Kantarcioglu
HICSS
2006
IEEE
117views Biometrics» more  HICSS 2006»
14 years 3 months ago
The Role of Virtual Distance in Innovation and Success
Although prior research has tended to dichotomize work teams as virtual or nonvirtual, most project teams today involve some mix of face-to-face and virtual interaction. We develo...
Karen Sobel Lojeski, Richard Reilly, Peter Dominic...
ETFA
2005
IEEE
14 years 3 months ago
A security architecture for data privacy and security
Data access and software exchange are often achieved over insecure networks such as the public Internet. System designers are therefore forced to be proactive with regard to verif...
Alfred C. Weaver
SCAM
2005
IEEE
14 years 3 months ago
Static Analysis for Computing Escapability and Mutability for Java Components
A common theme in information security is protection of trusted software components against unauthorized access by untrusted users. In the context of distributed object technologi...
Aiwu Shi, Gleb Naumovich