Sciweavers

3349 search results - page 144 / 670
» Data Security
Sort
View
159
Voted
BTW
2005
Springer
177views Database» more  BTW 2005»
15 years 9 months ago
Adaptive XML Access Control Based on Query Nesting, Modification and Simplification
: Access control is an important aspect in guaranteeing data privacy within XML data sources which are accessed by users with different access rights. The goal of predicative acces...
Stefan Böttcher, Rita Steinmetz
ESSOS
2009
Springer
15 years 10 months ago
Idea: Trusted Emergency Management
Through first-responder access to sensitive information for which they have not been pre-vetted, lives and property can be saved. We describe enhancements to a trusted emergency i...
Timothy E. Levin, Cynthia E. Irvine, Terry Benzel,...
99
Voted
CORR
2008
Springer
91views Education» more  CORR 2008»
15 years 3 months ago
Secure Lossless Compression with Side Information
Secure data compression in the presence of side information at both a legitimate receiver and an eavesdropper is explored. A noise-free, limited rate link between the source and th...
Deniz Gündüz, Elza Erkip, H. Vincent Poo...
121
Voted
CCS
2006
ACM
15 years 7 months ago
Searchable symmetric encryption: improved definitions and efficient constructions
Searchable symmetric encryption (SSE) allows a party to outsource the storage of his data to another party in a private manner, while maintaining the ability to selectively search...
Reza Curtmola, Juan A. Garay, Seny Kamara, Rafail ...
134
Voted
TCC
2005
Springer
166views Cryptology» more  TCC 2005»
15 years 9 months ago
Adaptively-Secure, Non-interactive Public-Key Encryption
Adaptively-secure encryption schemes ensure secrecy even in the presence of an adversary who can corrupt parties in an adaptive manner based on public keys, ciphertexts, and secret...
Ran Canetti, Shai Halevi, Jonathan Katz