Sciweavers

575 search results - page 13 / 115
» A model for evaluating IT security investments
Sort
View
SDMW
2007
Springer
15 years 8 months ago
Query Rewriting Algorithm Evaluation for XML Security Views
Abstract. We investigate the experimental effectiveness of query rewriting over XML security views. Our model consists of access control policies specified over DTDs with XPath e...
Nataliya Rassadko
100
Voted
INFORMATIKTAGE
2008
15 years 3 months ago
Practical Secure Function Evaluation
: This thesis focuses on the practical aspects of general two-party Secure Function Evaluation (SFE). A new SFE protocol that allows free evaluation of XOR gates and is provably se...
Thomas Schneider 0003
ACL
2010
14 years 12 months ago
Modeling Norms of Turn-Taking in Multi-Party Conversation
Substantial research effort has been invested in recent decades into the computational study and automatic processing of multi-party conversation. While most aspects of conversati...
Kornel Laskowski
102
Voted
HPCC
2007
Springer
15 years 8 months ago
Security Enhancement and Performance Evaluation of an Object-Based Storage System
Object-based storage offloads some works of file systems to storage devices to improve security, scalability, and performance. Security is a main concern when sharing data over ne...
Po-Chun Liu, Sheng-Kai Hung, Yarsun Hsu
112
Voted
ANSS
2005
IEEE
15 years 7 months ago
An Extensible Platform for Evaluating Security Protocols
We present a discrete-event network simulator, called Simnet, designed specifically for analyzing networksecurity protocols. The design and implementation is focused on simplicit...
Seny Kamara, Darren Davis, Lucas Ballard, Ryan Cau...