Sciweavers

3821 search results - page 680 / 765
» A Security Model for Aglets
Sort
View
ESORICS
2009
Springer
16 years 1 months ago
Dynamic Enforcement of Abstract Separation of Duty Constraints
Separation of Duty Constraints David Basin1 , Samuel J. Burri1,2 , and G?unter Karjoth2 1 ETH Zurich, Department of Computer Science, Switzerland 2 IBM Research, Zurich Research La...
David A. Basin, Günter Karjoth, Samuel J. Bur...
133
Voted
PKC
2009
Springer
172views Cryptology» more  PKC 2009»
16 years 1 months ago
CCA-Secure Proxy Re-encryption without Pairings
ded abstract of this paper appears in PKC 2009, S. Jarecki, G. Tsudik (Eds.), volume 5443 of LNCS, pp. 357-376, Sringer-Verlag, 2009. CCA-Secure Proxy Re-Encryption without Pairing...
Jun Shao, Zhenfu Cao
107
Voted
KDD
2009
ACM
296views Data Mining» more  KDD 2009»
16 years 1 months ago
Anonymizing healthcare data: a case study on the blood transfusion service
: Gaining access to high-quality health data is a vital requirement to informed decision making for medical practitioners and pharmaceutical researchers. Driven by mutual benefits ...
Noman Mohammed, Benjamin C. M. Fung, Patrick C. K....
102
Voted
STOC
2007
ACM
136views Algorithms» more  STOC 2007»
16 years 1 months ago
Exponential separations for one-way quantum communication complexity, with applications to cryptography
We give an exponential separation between one-way quantum and classical communication protocols for two partial Boolean functions, both of which are variants of the Boolean Hidden...
Dmitry Gavinsky, Julia Kempe, Iordanis Kerenidis, ...
184
Voted
SIGMOD
2007
ACM
161views Database» more  SIGMOD 2007»
16 years 28 days ago
Homeviews: peer-to-peer middleware for personal data sharing applications
This paper presents HomeViews, a peer-to-peer middleware system for building personal data management applications. HomeViews provides abstractions and services for data organizat...
Roxana Geambasu, Magdalena Balazinska, Steven D. G...