Sciweavers

1286 search results - page 101 / 258
» A Practical Modelling Notation for Secure Distributed Comput...
Sort
View
NOSSDAV
2009
Springer
15 years 9 months ago
Probabilistic event resolution with the pairwise random protocol
Peer-to-peer distributed virtual environments (DVE's) distribute state tracking and state transitions. Many DVE's - such as online games - require ways to fairly determi...
John L. Miller, Jon Crowcroft
113
Voted
PKC
2004
Springer
112views Cryptology» more  PKC 2004»
15 years 8 months ago
Identity-Based Threshold Decryption
Abstract. In this paper, we examine issues related to the construction of identity-based threshold decryption schemes and argue that it is important in practice to design an identi...
Joonsang Baek, Yuliang Zheng
DEXAW
1999
IEEE
106views Database» more  DEXAW 1999»
15 years 7 months ago
Textual Similarities Based on a Distributional Approach
The design of efficient textual similarities is an important issue in the domain of textual data exploration. Textual similarities are for example central in document collection s...
Romaric Besançon, Martin Rajman, Jean-C&eac...
FODO
1989
Springer
164views Algorithms» more  FODO 1989»
15 years 7 months ago
ITOSS: An Integrated Toolkit For Operating System Security
d Abstract) Michael Rabin Aiken Computation Laboratory Harvard University Cambridge, MA 02138 J. D. Tygar School of Computer Science Carnegie Mellon University Pittsburgh, PA 15213...
Michael O. Rabin, J. D. Tygar
POLICY
2007
Springer
15 years 9 months ago
Distributed Enforcement of Unlinkability Policies: Looking Beyond the Chinese Wall
We present a discretionary access control framework that can be used to control a principal’s ability to link information from two or more audit records and compromise a user’...
Apu Kapadia, Prasad Naldurg, Roy H. Campbell