Sciweavers

556 search results - page 70 / 112
» An Abstract Reduction Model for Computer Security Risk
Sort
View
273
Voted
ICDE
2008
IEEE
498views Database» more  ICDE 2008»
17 years 1 months ago
Injector: Mining Background Knowledge for Data Anonymization
Existing work on privacy-preserving data publishing cannot satisfactorily prevent an adversary with background knowledge from learning important sensitive information. The main cha...
Tiancheng Li, Ninghui Li
WFLP
2009
Springer
255views Algorithms» more  WFLP 2009»
15 years 6 months ago
Constraint Based Strategies
Numerous computational and deductive frameworks use the notion of strategy to guide reduction and search space exploration, making the macro scale control of micro operations an ex...
Claude Kirchner, Florent Kirchner, Hél&egra...
SIAMREV
2010
108views more  SIAMREV 2010»
14 years 8 months ago
Market Design for Emission Trading Schemes
Abstract. The main thrust of the paper is the design and the numerical analysis of new capand-trade schemes for the control and the reduction of atmospheric pollution. The tools de...
René Carmona, Max Fehr, Juri Hinz, Arnaud P...
113
Voted
ICDCS
2007
IEEE
15 years 8 months ago
Secure Event Dissemination in Publish-Subscribe Networks
Abstract. Content-based publish-subscribe (pub-sub) systems are an emerging paradigm for building large-scale information delivery systems. Secure event dissemination in a pub-sub ...
Mudhakar Srivatsa, Ling Liu
WISTP
2007
Springer
15 years 8 months ago
Mobile Phones as Secure Gateways for Message-Based Ubiquitous Communication
Abstract. For ubiquitous communication self-organising adhoc networks become more and more important. We consider mobile phones as appropriate secure gateways to provide access to ...
Walter Bamberger, Oliver Welter, Stephan Spitz