Sciweavers

726 search results - page 79 / 146
» An Access Control Scheme for Protecting Personal Data
Sort
View
CCS
2009
ACM
15 years 2 months ago
TruWallet: trustworthy and migratable wallet-based web authentication
Identity theft has fostered to a major security problem on the Internet, in particular stealing passwords for web applications through phishing and malware. We present TruWallet, ...
Sebastian Gajek, Hans Löhr, Ahmad-Reza Sadegh...
WMPI
2004
ACM
15 years 3 months ago
Addressing mode driven low power data caches for embedded processors
The size and speed of first-level caches and SRAMs of embedded processors continue to increase in response to demands for higher performance. In power-sensitive devices like PDAs a...
Ramesh V. Peri, John Fernando, Ravi Kolagotla
CCS
2006
ACM
15 years 1 months ago
RoleMiner: mining roles using subset enumeration
Role engineering, the task of defining roles and associating permissions to them, is essential to realize the full benefits of the role-based access control paradigm. Essentially,...
Jaideep Vaidya, Vijayalakshmi Atluri, Janice Warne...
SIGMOD
2009
ACM
197views Database» more  SIGMOD 2009»
15 years 10 months ago
Secure kNN computation on encrypted databases
Service providers like Google and Amazon are moving into the SaaS (Software as a Service) business. They turn their huge infrastructure into a cloud-computing environment and aggr...
Wai Kit Wong, David Wai-Lok Cheung, Ben Kao, Nikos...
66
Voted
GI
2004
Springer
15 years 3 months ago
User Authentication in Sensor Networks
d Abstract) Zinaida Benenson Felix G¨artner Dogan Kesdogan RWTH Aachen, Department of Computer Science, D-52056 Aachen, Germany : If the data collected within a sensor network is ...
Zinaida Benenson, Felix C. Gärtner, Dogan Kes...