Sciweavers

791 search results - page 89 / 159
» Users and Trust in Cyberspace
Sort
View
IEEEARES
2007
IEEE
14 years 2 months ago
Agent Alliances: A Means for Practical Threshold Signature
In [7] we have proposed a model for the robust and private evaluation of a function within a group of cooperating mobile agents, called an agent Alliance. The model has been given...
Regine Endsuleit, Christoph Amma
ICDE
2006
IEEE
125views Database» more  ICDE 2006»
14 years 1 months ago
Towards a Quality Model for Effective Data Selection in Collaboratories
Data-driven scientific applications utilize workflow frameworks to execute complex dataflows, resulting in derived data products of unknown quality. We discuss our on-going resear...
Yogesh Simmhan, Beth Plale, Dennis Gannon
ASIAN
2005
Springer
103views Algorithms» more  ASIAN 2005»
14 years 1 months ago
Implementing a Tamper-Evident Database System
Abstract. Data integrity is an assurance that data has not been modified in an unknown or unauthorized manner. The goal of this paper is to allow a user to leverage a small amount...
Gerome Miklau, Dan Suciu
CSE
2009
IEEE
14 years 12 days ago
Privacy-Enhanced Event Scheduling
—Event schedulers, well-known from groupware and social software, typically share the problem that they disclose detailed availability patterns of their users. This paper disting...
Benjamin Kellermann, Rainer Böhme
ECSA
2008
Springer
13 years 9 months ago
A Security Model for Internet-Based Digital Asset Management Systems
Abstract. Usage and exploitation of the Internet is a critical requirement for managing and distributing valuable digital assets. This requirement introduces a great number of thre...
Ioannis Chatzigiannakis, Vasiliki Liagkou, D. Salo...