-
1
-
-
54249147606
-
-
http://www.arma.org/erecords/index.cfm
-
-
-
-
2
-
-
44949276851
-
On the representation and querying of sets of possible words
-
Ahitehoul, S., Kanellakis, P., Grahne, G.: On the representation and querying of sets of possible words. Theoretical Computer Science 78(1) (1991)
-
(1991)
Theoretical Computer Science
, vol.78
, Issue.1
-
-
Ahitehoul, S.1
Kanellakis, P.2
Grahne, G.3
-
3
-
-
0026941826
-
The management of probabilistic data
-
Barbará, D., Garcia-Molina, H., Porter, D.: The management of probabilistic data. IEEE Transactions on Knowledge and Data Engineering 4(5), 487-502 (1992)
-
(1992)
IEEE Transactions on Knowledge and Data Engineering
, vol.4
, Issue.5
, pp. 487-502
-
-
Barbará, D.1
Garcia-Molina, H.2
Porter, D.3
-
5
-
-
19944380112
-
Database security - concepts, approaches, and challenges
-
Bertino, E., Sandhu, R.: Database security - concepts, approaches, and challenges. IEEE Transaction on dependable and secure computing 2(1), 2-19 (2005)
-
(2005)
IEEE Transaction on dependable and secure computing
, vol.2
, Issue.1
, pp. 2-19
-
-
Bertino, E.1
Sandhu, R.2
-
6
-
-
0003400255
-
Integrity considerations for secure computer systems
-
Technical Report TR-3153, Mitre
-
Biba, K.: Integrity considerations for secure computer systems. Technical Report TR-3153, Mitre (1977)
-
(1977)
-
-
Biba, K.1
-
7
-
-
33748085705
-
Systematic control and management of data integrity
-
Byun, J.-B., Sohn, Y., Bertino, E.: Systematic control and management of data integrity. In: Proceedings of the 11th ACM symposium on Access control models and technologies, pp. 101-110 (2006)
-
(2006)
Proceedings of the 11th ACM symposium on Access control models and technologies
, pp. 101-110
-
-
Byun, J.-B.1
Sohn, Y.2
Bertino, E.3
-
9
-
-
54249118433
-
Trust evaluation of data provenance
-
Dai, C., Lin, D., Bertino, E., Kantarcioglu, M.: Trust evaluation of data provenance. In: CERIAS Technical Report (2008)
-
(2008)
CERIAS Technical Report
-
-
Dai, C.1
Lin, D.2
Bertino, E.3
Kantarcioglu, M.4
-
10
-
-
54249168906
-
-
Dai, C., Lin, D., Kantarcioglu, M., Bertino, E., Celikel, E., Thuraisingham, B.: Policy observing query evaluation based on provenance confidence and lineage propagation (under preparation, 2008)
-
Dai, C., Lin, D., Kantarcioglu, M., Bertino, E., Celikel, E., Thuraisingham, B.: Policy observing query evaluation based on provenance confidence and lineage propagation (under preparation, 2008)
-
-
-
-
11
-
-
84992227458
-
Proposed nist standard for role-based access control
-
Ferraiolo, D.F., Sandhu, R., Gavrila, S., Kuhn, D.R., Chandramouli, R.: Proposed nist standard for role-based access control. ACM Trans. Inf. Syst. Secur. 4(3), 224-274 (2001)
-
(2001)
ACM Trans. Inf. Syst. Secur
, vol.4
, Issue.3
, pp. 224-274
-
-
Ferraiolo, D.F.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.R.4
Chandramouli, R.5
-
12
-
-
0012840007
-
A probabilistic framework for vague queries and imprecise information in databases
-
Fuhr, N.: A probabilistic framework for vague queries and imprecise information in databases. In: Proc. VLDB, pp. 696-707 (1990)
-
(1990)
Proc. VLDB
, pp. 696-707
-
-
Fuhr, N.1
-
13
-
-
0030836948
-
A probabilistic relational algebra for the integration of information retrieval and database systems
-
Fuhr, N., Rölleke, T.: A probabilistic relational algebra for the integration of information retrieval and database systems. ACM Transactions on Information Systems 15(1), 32-66 (1997)
-
(1997)
ACM Transactions on Information Systems
, vol.15
, Issue.1
, pp. 32-66
-
-
Fuhr, N.1
Rölleke, T.2
-
14
-
-
84876985078
-
Models for incomplete and probabilistic information
-
Green, T.J., Tannen, V.: Models for incomplete and probabilistic information. In: Proc. IIDB Workshop (2006)
-
(2006)
Proc. IIDB Workshop
-
-
Green, T.J.1
Tannen, V.2
-
15
-
-
34548016110
-
Privcy aware role based access control
-
Ni, Q., Trombetta, A., Bertino, E., Lobo, J.: Privcy aware role based access control. In: Proceedings of the 12th ACM symposium on Access control models and technologies (2007)
-
(2007)
Proceedings of the 12th ACM symposium on Access control models and technologies
-
-
Ni, Q.1
Trombetta, A.2
Bertino, E.3
Lobo, J.4
-
17
-
-
0030086382
-
Role-based access control models
-
Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. IEEE Computer 29(2), 38-47 (1996)
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
18
-
-
33749596546
-
Working models for uncertain data
-
Sarma, A.D., Benjelloun, O., Halevy, A., Widom, J.: Working models for uncertain data. In: Proc. ICDE, page 7
-
Proc. ICDE
, pp. 7
-
-
Sarma, A.D.1
Benjelloun, O.2
Halevy, A.3
Widom, J.4
-
19
-
-
54249098909
-
-
Sarma, A.D., Theobal, M., Widom, J.: Exploiting lineage for confidence computation in uncertain and probabilistic databases. Technical Report, Stanford InfoLab (2007)
-
Sarma, A.D., Theobal, M., Widom, J.: Exploiting lineage for confidence computation in uncertain and probabilistic databases. Technical Report, Stanford InfoLab (2007)
-
-
-
-
20
-
-
31444456909
-
A survey of data provenance in e-science
-
Simmhan, Y.L., Plale, B., Gannon, D.: A survey of data provenance in e-science. SIGMOD Record 34(3), 31-36 (2005)
-
(2005)
SIGMOD Record
, vol.34
, Issue.3
, pp. 31-36
-
-
Simmhan, Y.L.1
Plale, B.2
Gannon, D.3
-
21
-
-
84858835658
-
Trio: A system for integrated management of data, accuracy, and lineage
-
Widom, J.: Trio: A system for integrated management of data, accuracy, and lineage. In: Proc. CIDR, pp. 262-276 (2005)
-
(2005)
Proc. CIDR
, pp. 262-276
-
-
Widom, J.1
-
22
-
-
36849093958
-
Truth discovery with multiple conflicting information providers on the web
-
Yin, X., Han, J., Yu, P.S.: Truth discovery with multiple conflicting information providers on the web. In: Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD 2007), pp. 1048-1052 (2007)
-
(2007)
Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD
, pp. 1048-1052
-
-
Yin, X.1
Han, J.2
Yu, P.S.3
|