Sciweavers

922 search results - page 35 / 185
» Attribute based data sharing with attribute revocation
Sort
View
CCS
2007
ACM
15 years 3 months ago
Provably secure ciphertext policy ABE
In ciphertext policy attribute-based encryption (CP-ABE), every secret key is associated with a set of attributes, and every ciphertext is associated with an access structure on a...
Ling Cheung, Calvin C. Newport
ICDM
2007
IEEE
138views Data Mining» more  ICDM 2007»
15 years 4 months ago
Bandit-Based Algorithms for Budgeted Learning
We explore the problem of budgeted machine learning, in which the learning algorithm has free access to the training examples’ labels but has to pay for each attribute that is s...
Kun Deng, Chris Bourke, Stephen D. Scott, Julie Su...
CSE
2009
IEEE
15 years 4 months ago
Analysis of a Location-Based Social Network
—Location-based Social Networks (LSNs) allow users to see where their friends are, to search location-tagged content within their social graph, and to meet others nearby. The rec...
Nan Li, Guanling Chen
ICDCS
2002
IEEE
15 years 2 months ago
Reasoning about Joint Administration of Access Policies for Coalition Resources
We argue that joint administration of access policies for a dynamic coalition formed by autonomous domains requires that these domains set up a coalition authority that distribute...
Himanshu Khurana, Virgil D. Gligor, John Linn
DBKDA
2009
IEEE
136views Database» more  DBKDA 2009»
15 years 1 months ago
Visualization and Integration of Databases Using Self-Organizing Map
Abstract--With the growing computer networks, accessible data is becoming increasing distributed. Understanding and integrating remote and unfamiliar data sources are important dat...
Farid Bourennani, Ken Q. Pu, Ying Zhu