Sciweavers

831 search results - page 88 / 167
» A Security Concept for OLAP
Sort
View
IEEEARES
2009
IEEE
15 years 6 months ago
Identity-Based Hybrid Signcryption
—Signcryption is a cryptographic primitive that fulfills both the functions of digital signature and public key encryption simultaneously, at a cost significantly lower than th...
Fagen Li, Masaaki Shirase, Tsuyoshi Takagi
OOPSLA
2009
Springer
15 years 6 months ago
Language factories
Programming languages are the primary mechanism by which software is created, yet most of us have access to only a few, fixed, programming languages. Any problem we wish to expre...
Tony Clark, Laurence Tratt
PET
2009
Springer
15 years 6 months ago
Privacy-Preserving Policy-Based Information Transfer
As the global society becomes more interconnected and more privacy-conscious, communication protocols must balance access control with protecting participants’ privacy. A common ...
Emiliano De Cristofaro, Stanislaw Jarecki, Jihye K...
CAISE
2007
Springer
15 years 6 months ago
Achieving trust in IT outsourcing relationships
IT outsourcing is a viable option for organizations to maintain competitiveness and get the ability to focus on core competences. However, there are risks, such as handing over sen...
Eva Söderström, Christian Lennerholt
CCS
2007
ACM
15 years 6 months ago
Elastic block ciphers: the basic design
We introduce the concept of an elastic block cipher, which refers to stretching the supported block size of a block cipher to any length up to twice the original block size while ...
Debra L. Cook, Angelos D. Keromytis, Moti Yung