Sciweavers

333 search results - page 67 / 67
» Computation with Absolutely No Space Overhead
Sort
View
CCS
2008
ACM
13 years 7 months ago
Towards an efficient and language-agnostic compliance checker for trust negotiation systems
To ensure that a trust negotiation succeeds whenever possible, authorization policy compliance checkers must be able to find all minimal sets of their owners' credentials tha...
Adam J. Lee, Marianne Winslett
CONCURRENCY
2007
118views more  CONCURRENCY 2007»
13 years 5 months ago
Design and implementation issues for distributed CCA framework interoperability
Component frameworks, including those that support the Common Component Architecture (CCA), represent a promising approach to addressing this challenge, one that is being realized...
Madhusudhan Govindaraju, Michael J. Lewis, Kenneth...
TKDE
2011
472views more  TKDE 2011»
13 years 10 days ago
Anonymous Publication of Sensitive Transactional Data
Abstract—Existing research on privacy-preserving data publishing focuses on relational data: in this context, the objective is to enforce privacy-preserving paradigms, such as k-...
Gabriel Ghinita, Panos Kalnis, Yufei Tao