Sciweavers

2272 search results - page 246 / 455
» Provable Data Privacy
Sort
View
CCS
1994
ACM
15 years 7 months ago
Application Access Control at Network Level
This paper describes an access control mechanism that enforces at the network level an access control decision that is taken at the application level. The mechanism is based on th...
Refik Molva, Erich Rütsche
145
Voted
ACSAC
2003
IEEE
15 years 7 months ago
Scalable and Efficient PKI for Inter-Organizational Communication
We propose an efficient and flexible system for a secure and authentic data exchange in a multiinstitutional environment, where the institutions maintain different databases and p...
Arne Ansper, Ahto Buldas, Margus Freudenthal, Jan ...
ESORICS
2008
Springer
15 years 5 months ago
A Distributed Implementation of the Certified Information Access Service
In this paper we consider the problem of securely outsourcing computation on private data. We present a protocol for securely distributing the computation of the data structures u...
Carlo Blundo, Emiliano De Cristofaro, Aniello Del ...
125
Voted
CASCON
2006
109views Education» more  CASCON 2006»
15 years 4 months ago
Legal research topics within services sciences
The paper presents a study to define some of the most important legal topics that need to be included in the Services Sciences' research agenda. To analyze what sort of legal...
Olli Pitkänen
ISI
2006
Springer
15 years 3 months ago
On the Topology of the Dark Web of Terrorist Groups
In recent years, terrorist groups have used the WWW to spread their ideologies, disseminate propaganda, and recruit members. Studying the terrorist websites may help us understand ...
Jennifer Jie Xu, Hsinchun Chen, Yilu Zhou, Jialun ...