Sciweavers

654 search results - page 112 / 131
» Privacy protection for RFID data
Sort
View
CCS
2008
ACM
15 years 23 hour ago
A formal framework for reflective database access control policies
Reflective Database Access Control (RDBAC) is a model in which a database privilege is expressed as a database query itself, rather than as a static privilege contained in an acce...
Lars E. Olson, Carl A. Gunter, P. Madhusudan
ISI
2006
Springer
14 years 10 months ago
Suspect Vehicle Identification for Border Safety with Modified Mutual Information
The Department of Homeland Security monitors vehicles entering and leaving the country at land ports of entry. Some vehicles are targeted to search for drugs and other contraband. ...
Siddharth Kaza, Yuan Wang, Hsinchun Chen
SP
2008
IEEE
162views Security Privacy» more  SP 2008»
14 years 10 months ago
Fable: A Language for Enforcing User-defined Security Policies
This paper presents FABLE, a core formalism for a programming language in which programmers may specify security policies and reason that these policies are properly enforced. In ...
Nikhil Swamy, Brian J. Corcoran, Michael Hicks
CCS
2010
ACM
14 years 8 months ago
Assessing trust in uncertain information using Bayesian description logic
Decision makers (humans or software agents alike) are faced with the challenge of examining large volumes of information originating from heterogeneous sources with the goal of as...
Achille Fokoue, Mudhakar Srivatsa, Robert Young
DASFAA
2011
IEEE
341views Database» more  DASFAA 2011»
14 years 7 months ago
Utility-Oriented K-Anonymization on Social Networks
\Identity disclosure" problem on publishing social network data has gained intensive focus from academia. Existing k-anonymization algorithms on social network may result in n...
Yazhe WANG, Long XIE, Baihua ZHENG, and Ken C. K. ...