On the representation and querying of sets of possible worlds
Selected papers of the workshop on Deductive database theory
Role-Based Access Control Models
Computer
A probabilistic relational algebra for the integration of information retrieval and database systems
ACM Transactions on Information Systems (TOIS)
Proposed NIST standard for role-based access control
ACM Transactions on Information and System Security (TISSEC)
The Management of Probabilistic Data
IEEE Transactions on Knowledge and Data Engineering
A Probabilistic Framework for Vague Queries and Imprecise Information in Databases
VLDB '90 Proceedings of the 16th International Conference on Very Large Data Bases
On Five Definitions of Data Integrity
Proceedings of the IFIP WG11.3 Working Conference on Database Security VII
Database Security-Concepts, Approaches, and Challenges
IEEE Transactions on Dependable and Secure Computing
A survey of data provenance in e-science
ACM SIGMOD Record
Working Models for Uncertain Data
ICDE '06 Proceedings of the 22nd International Conference on Data Engineering
Systematic control and management of data integrity
Proceedings of the eleventh ACM symposium on Access control models and technologies
Data Quality: Concepts, Methodologies and Techniques (Data-Centric Systems and Applications)
Data Quality: Concepts, Methodologies and Techniques (Data-Centric Systems and Applications)
Privacy-aware role based access control
Proceedings of the 12th ACM symposium on Access control models and technologies
Truth discovery with multiple conflicting information providers on the web
Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining
Models for incomplete and probabilistic information
EDBT'06 Proceedings of the 2006 international conference on Current Trends in Database Technology
Provenance-based trustworthiness assessment in sensor networks
Proceedings of the Seventh International Workshop on Data Management for Sensor Networks
Assuring data trustworthiness: concepts and research challenges
SDM'10 Proceedings of the 7th VLDB conference on Secure data management
Heterogeneous network-based trust analysis: a survey
ACM SIGKDD Explorations Newsletter
Privacy-preserving assessment of location data trustworthiness
Proceedings of the 19th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems
Hi-index | 0.00 |
With the increased need of data sharing among multiple organizations, such as government organizations, financial corporations, medical hospitals and academic institutions, it is critical to ensure data integrity so that effective decisions can be made based on these data. In this paper, we first present an architecture for a comprehensive integrity control system based on data validation and metadata management. We then discuss an important issue in the data validation, that is, the evaluation of data provenance and propose a trust model for estimating the trustworthiness of data and data providers. By taking into account confidence about data provenance, we introduce an approach for policy observing query evaluation as a complement to the integrity control system.