Sciweavers

2272 search results - page 202 / 455
» Provable Data Privacy
Sort
View
SAFECOMP
1998
Springer
15 years 5 months ago
Fault-Tolerant Communication in Large-Scale Manipulators
Abstract. In this paper concepts for fault-tolerant communication systems in large-scale manipulators for heavy weights are introduced. This class of robots makes high demands on s...
Hans-Dieter Kochs, Walter Geisselhardt, Holger Hil...
118
Voted
ISI
2008
Springer
15 years 22 days ago
Summary management in unstructured P2P systems
In this paper, we propose managing data summaries in unstructured P2P systems. Our summaries are intelligible views with two main virtues. First, they can be directly queried and u...
Rabab Hayek, Guillaume Raschia, Patrick Valduriez,...
96
Voted
CCS
2007
ACM
15 years 7 months ago
Fuzzy extractors for continuous distributions
We show that there is a direct relation between the maximum length of the keys extracted from biometric data and the error rates of the biometric system. The length of the bio-key...
Ileana Buhan, Jeroen Doumen, Pieter H. Hartel, Ray...
ESORICS
2005
Springer
15 years 6 months ago
On Obligations
Access control is concerned with granting access to sensitive data based on conditions that relate to the past or present, so-called provisions. Expressing requirements from the do...
Manuel Hilty, David A. Basin, Alexander Pretschner
93
Voted
SP
1987
IEEE
118views Security Privacy» more  SP 1987»
15 years 4 months ago
A Comparison of Commercial and Military Computer Security Policies
Most discussions of computer security focus on control of disclosure. In Particular, the U.S. Department of Defense has developed a set of criteria for computer mechanisms to prov...
D. D. Clark, D. R. Wilson