Sciweavers

599 search results - page 85 / 120
» Managing Privacy in LBAC Systems
Sort
View
SACMAT
2009
ACM
15 years 8 months ago
Automating role-based provisioning by learning from examples
Role-based provisioning has been adopted as a standard component in leading Identity Management products due to its low administration cost. However, the cost of adjusting existin...
Qun Ni, Jorge Lobo, Seraphin B. Calo, Pankaj Rohat...
ACSAC
2010
IEEE
14 years 11 months ago
Breaking e-banking CAPTCHAs
Many financial institutions have deployed CAPTCHAs to protect their services (e.g., e-banking) from automated attacks. In addition to CAPTCHAs for login, CAPTCHAs are also used to...
Shujun Li, S. Amier Haider Shah, M. Asad Usman Kha...
IACR
2011
158views more  IACR 2011»
14 years 1 months ago
Can Homomorphic Encryption be Practical?
Abstract. The prospect of outsourcing an increasing amount of data storage and management to cloud services raises many new privacy concerns for individuals and businesses alike. T...
Kristin Lauter, Michael Naehrig, Vinod Vaikuntanat...
WWW
2007
ACM
16 years 2 months ago
Organizing Publications and Bookmarks in BibSonomy
BibSonomy is a web-based social resource sharing system which allows users to organise and share bookmarks and publications in a collaborative manner. Apart from standard folksono...
Andreas Hotho, Beate Krause, Christoph Schmitz, Ge...
ISI
2004
Springer
15 years 7 months ago
West Nile Virus and Botulism Portal: A Case Study in Infectious Disease Informatics
Abstract. Information technologies and infectious disease informatics are playing an increasingly important role in preventing, detecting, and managing infectious disease outbreaks...
Daniel Dajun Zeng, Hsinchun Chen, Chunju Tseng, Ca...