Sciweavers

861 search results - page 116 / 173
» Ranking Privacy Policy
Sort
View
FC
2005
Springer
104views Cryptology» more  FC 2005»
15 years 5 months ago
Event Driven Private Counters
We define and instantiate a cryptographic scheme called “private counters”, which can be used in applications such as preferential voting to express and update preferences (or...
Eu-Jin Goh, Philippe Golle
CCS
2009
ACM
16 years 13 days ago
Confidentiality-preserving distributed proofs of conjunctive queries
Distributed proof construction protocols have been shown to be valuable for reasoning about authorization decisions in open distributed environments such as pervasive computing sp...
Adam J. Lee, Kazuhiro Minami, Nikita Borisov
ACSAC
2009
IEEE
15 years 6 months ago
Semantically Rich Application-Centric Security in Android
—Smartphones are now ubiquitous. However, the security requirements of these relatively new systems and the applications they support are still being understood. As a result, the...
Machigar Ongtang, Stephen E. McLaughlin, William E...
IEEEARES
2009
IEEE
15 years 6 months ago
Enhancing Control of Service Compositions in Service-Oriented Architectures
In a service-oriented architecture, service compositions are assembled from other component services. Such compositions may include services from unknown and potentially untrusted...
Christian Schneider, Frederic Stumpf, Claudia Ecke...
IEEEARES
2008
IEEE
15 years 6 months ago
A Framework for Proactive Fault Tolerance
Fault tolerance is a major concern to guarantee availability of critical services as well as application execution. Traditional approaches for fault tolerance include checkpoint/r...
Geoffroy Vallée, Kulathep Charoenpornwattan...