Sciweavers

53 search results - page 2 / 11
» Efficient and privacy-preserving enforcement of attribute-ba...
Sort
View
80
Voted
IDTRUST
2010
ACM
15 years 6 months ago
Efficient and privacy-preserving enforcement of attribute-based access control
Ning Shang, Federica Paci, Elisa Bertino
SUTC
2006
IEEE
15 years 5 months ago
The Computational Complexity of Enforceability Validation for Generic Access Control Rules
In computer security, many researches have tackled on the possibility of a unified model of access control, which could enforce any access control policies within a single unified...
Vincent C. Hu, D. Richard Kuhn, David F. Ferraiolo
88
Voted
CCS
2007
ACM
15 years 6 months ago
Automaton segmentation: a new approach to preserve privacy in xml information brokering
A Distributed Information Brokering System (DIBS) is a peer-to-peer overlay network that comprises diverse data servers and brokering components helping client queries locate the ...
Fengjun Li, Bo Luo, Peng Liu, Dongwon Lee, Chao-Hs...
VLDB
2006
ACM
138views Database» more  VLDB 2006»
15 years 12 months ago
Succinct representation of flexible and privacy-preserving access rights
Abstract We explore the problem of portable and flexible privacy preserving access rights that permit access to a large collection of digital goods. Privacy-preserving access contr...
Marina Blanton, Mikhail J. Atallah