Sciweavers

1402 search results - page 148 / 281
» Personalized privacy preservation
Sort
View
CSFW
2000
IEEE
15 years 5 months ago
Reasoning about Secrecy for Active Networks
In this paper we develop a language of mobile agents called uPLAN for describing the capabilities of active (programmable) networks. We use a formal semantics for uPLAN to demonst...
Pankaj Kakkar, Carl A. Gunter, Martín Abadi
103
Voted
ACSAC
1999
IEEE
15 years 5 months ago
An Asynchronous Distributed Access Control Architecture for IP over ATM Networks
In this article, we describe a new architecture providing the access control service in both ATM and IPover-ATM networks. This architecture is based on agents distributed in netwo...
Olivier Paul, Maryline Laurent, Sylvain Gombault
SCN
2010
Springer
132views Communications» more  SCN 2010»
14 years 10 months ago
Solving Revocation with Efficient Update of Anonymous Credentials
Anonymous credential system promise efficient, ubiquitous access to digital services while preserving user privacy. However, their diffusion is impaired by the lack of efficient re...
Jan Camenisch, Markulf Kohlweiss, Claudio Soriente
127
Voted
SODA
2010
ACM
174views Algorithms» more  SODA 2010»
14 years 10 months ago
Differentially Private Combinatorial Optimization
Consider the following problem: given a metric space, some of whose points are "clients," select a set of at most k facility locations to minimize the average distance f...
Anupam Gupta, Katrina Ligett, Frank McSherry, Aaro...
ECUMN
2007
Springer
15 years 7 months ago
Context-Sensitive Security Framework for Pervasive Environments
Pervasive systems enable us to have an overview of what digital environments will look like in the future. Opportunities given by pervasive systems, both in terms of applications ...
Charles-Eric Pigeot, Yann Gripay, Vasile-Marian Sc...