-
2
-
-
84925001453
-
Uldbs: Databases with uncertainty and lineage
-
Benjelloun, O., Sarma, A., Halevy, A., Widom, J.: Uldbs: databases with uncertainty and lineage. In: Proc. Int. Conf. on Very Large Data Bases, VLDB, pp. 953-964 (2006)
-
(2006)
Proc. Int. Conf. on Very Large Data Bases, VLDB
, pp. 953-964
-
-
Benjelloun, O.1
Sarma, A.2
Halevy, A.3
Widom, J.4
-
5
-
-
79960570447
-
Why and where: A characterization of data provenance
-
Van den Bussche, J., Vianu, V. (eds.) ICDT 2001. Springer, Heidelberg
-
Buneman, P., Khanna, S., Tan, W.-C.: Why and where: A characterization of data provenance. In: Van den Bussche, J., Vianu, V. (eds.) ICDT 2001. LNCS, vol. 1973, pp. 316-330. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1973
, pp. 316-330
-
-
Buneman, P.1
Khanna, S.2
Tan, W.-C.3
-
6
-
-
77951896306
-
Provenance in databases: Why, how, and where
-
Cheney, J., Chiticariu, L., Tan, W.-C.: Provenance in databases: Why, how, and where. Foundations and Trends in Databases 1(4), 379-474 (2009)
-
(2009)
Foundations and Trends in Databases
, vol.1
, Issue.4
, pp. 379-474
-
-
Cheney, J.1
Chiticariu, L.2
Tan, W.-C.3
-
7
-
-
0014797273
-
A relational model of data for large shared data banks
-
Codd, E.: A relational model of data for large shared data banks. Comm. of the ACM 13(6), 377-387 (1970)
-
(1970)
Comm. of the ACM
, vol.13
, Issue.6
, pp. 377-387
-
-
Codd, E.1
-
8
-
-
0000278897
-
Tracing the lineage of view data in a warehousing environment
-
Cui, Y., Widom, J., Wiener, J.: Tracing the lineage of view data in a warehousing environment. ACM Trans. Database Syst. 25, 179-227 (2000)
-
(2000)
ACM Trans. Database Syst.
, vol.25
, pp. 179-227
-
-
Cui, Y.1
Widom, J.2
Wiener, J.3
-
9
-
-
80053157868
-
Provably secure authentication of digital media through invertible watermarks
-
Report 293
-
Dittmann, J., Katzenbeisser, S., Schallhart, C., Veith, H.: Provably secure authentication of digital media through invertible watermarks. Cryptology ePrint Archive, Report 293 (2004)
-
(2004)
Cryptology EPrint Archive
-
-
Dittmann, J.1
Katzenbeisser, S.2
Schallhart, C.3
Veith, H.4
-
10
-
-
0035471541
-
Using cryptographic and watermarking algorithms
-
Dittmann, J., Wohlmacher, P., Nahrstedt, K.: Using cryptographic and watermarking algorithms. IEEE MultiMedia 8, 54-65 (2001)
-
(2001)
IEEE MultiMedia
, vol.8
, pp. 54-65
-
-
Dittmann, J.1
Wohlmacher, P.2
Nahrstedt, K.3
-
11
-
-
79952976688
-
Federal data protection act (bdsg) in the version promulgated on 14 January 2003
-
The Federal Commisioner for Data Protection and Freedom of Information
-
The Federal Commisioner for Data Protection and Freedom of Information. Federal data protection act (bdsg) in the version promulgated on 14 January 2003 (federal law gazette i, p. 66),
-
Federal Law Gazette
, vol.1
, pp. 66
-
-
-
12
-
-
79952963535
-
-
last amended by article 1 of the act of 14 August (in force from September 1, 2009)
-
last amended by article 1 of the act of 14 August 2009, (federal law gazette i, p. 2814), (in force from September 1, 2009)
-
(2009)
Federal Law Gazette
, vol.1
, pp. 2814
-
-
-
14
-
-
68649124680
-
Providing cryptographic security and evidentiary chain-of-custody with the advanced forensic format, library, and tools
-
Garfinkel, S.: Providing cryptographic security and evidentiary chain-of-custody with the advanced forensic format, library, and tools. Digital Crime and Forensics 1(1), 1-28 (2009)
-
(2009)
Digital Crime and Forensics
, vol.1
, Issue.1
, pp. 1-28
-
-
Garfinkel, S.1
-
15
-
-
85062006160
-
The case of the fake picasso: Preventing history forgery with secure provenance
-
USENIX Association
-
Hasan, R., Sion, R., Winslett, M.: The case of the fake picasso: preventing history forgery with secure provenance. In: Proc. Int. Conf. on File and Storage Technologies, pp. 1-14. USENIX Association (2009)
-
(2009)
Proc. Int. Conf. on File and Storage Technologies
, pp. 1-14
-
-
Hasan, R.1
Sion, R.2
Winslett, M.3
-
16
-
-
79952977734
-
Video surveillance: A new forensic model for the forensically sound retrival of picture content off a memory dump
-
Proc. of Informatik 2009 - Digitale Multimedia-Forensik
-
Kiltz, S., Hoppe, T., Dittmann, J., Vielhauer, C.: Video surveillance: A new forensic model for the forensically sound retrival of picture content off a memory dump. In: Proc. of Informatik 2009 - Digitale Multimedia-Forensik. LNI, vol. 154, pp. 1619-1633 (2009)
-
(2009)
LNI
, vol.154
, pp. 1619-1633
-
-
Kiltz, S.1
Hoppe, T.2
Dittmann, J.3
Vielhauer, C.4
-
19
-
-
54049150418
-
Biometric systems and data protection legislation in germany
-
IEEE, Los Alamitos
-
Meints, M., Biermann, H., Bromba, M., Busch, C., Hornung, G., Quiring-Kock, G.: Biometric systems and data protection legislation in germany. In: Proc. Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing, pp. 1088-1093. IEEE, Los Alamitos (2008)
-
(2008)
Proc. Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing
, pp. 1088-1093
-
-
Meints, M.1
Biermann, H.2
Bromba, M.3
Busch, C.4
Hornung, G.5
Quiring-Kock, G.6
-
22
-
-
1842829828
-
-
U.S. Dept. of Commerce, National Institute of Standards and Technology
-
Stoneburner, G., Goguen, A., Feringa, A.: Risk management guide for information technology systems [electronic resource]: recommendations of the National Institute of Standards and Technology. U.S. Dept. of Commerce, National Institute of Standards and Technology
-
Risk Management Guide for Information Technology Systems [Electronic Resource]: Recommendations of the National Institute of Standards and Technology
-
-
Stoneburner, G.1
Goguen, A.2
Feringa, A.3
-
23
-
-
42449132132
-
Provenance in databases: Past, current, and future
-
Tan, W.-C.: Provenance in databases: Past, current, and future. IEEE Data Engineering Bulletin 32(4), 3-12 (2007)
-
(2007)
IEEE Data Engineering Bulletin
, vol.32
, Issue.4
, pp. 3-12
-
-
Tan, W.-C.1
-
24
-
-
79952948759
-
-
Technical Report CSE-TR-548-08, Univ. of Michigan
-
Zhang, J., Chapman, A., LeFevre, K.: Do you know where your data's been? - Tamper-evident database provenance. Technical Report CSE-TR-548-08, Univ. of Michigan (2009)
-
(2009)
Do You Know Where Your Data's Been? Tamper-evident Database Provenance
-
-
Zhang, J.1
Chapman, A.2
LeFevre, K.3
|