Sciweavers

3712 search results - page 456 / 743
» Role-Based Access Control
Sort
View
PVLDB
2008
163views more  PVLDB 2008»
15 years 4 months ago
AlvisP2P: scalable peer-to-peer text retrieval in a structured P2P network
In this paper we present the AlvisP2P IR engine, which enables efficient retrieval with multi-keyword queries from a global document collection available in a P2P network. In such...
Toan Luu, Gleb Skobeltsyn, Fabius Klemm, Maroje Pu...
PAIRING
2010
Springer
152views Cryptology» more  PAIRING 2010»
15 years 3 months ago
Increased Resilience in Threshold Cryptography: Sharing a Secret with Devices That Cannot Store Shares
Threshold cryptography has been used to secure data and control access by sharing a private cryptographic key over different devices. This means that a minimum number of these dev...
Koen Simoens, Roel Peeters, Bart Preneel
136
Voted
DLOG
2010
15 years 3 months ago
The Logical Difference For Fuzzy EL+ Ontologies
Abstract. Ontologies undergo changes for reasons such as changes in knowledge, meeting varying application requirements. Thus, for different versions of a considered ontology, it i...
Shasha Feng, Yonggang Zhang, Dantong Ouyang, Haiya...
ISW
2010
Springer
15 years 2 months ago
Privilege Escalation Attacks on Android
Abstract. Android is a modern and popular software platform for smartphones. Among its predominant features is an advanced security model which is based on application-oriented man...
Lucas Davi, Alexandra Dmitrienko, Ahmad-Reza Sadeg...
172
Voted
CRISIS
2009
15 years 2 months ago
A secured delegation of remote services on IPv6 home networks
IPv6 is an attractive technology for innovative services such as health care monitoring, alarm systems, peer to peer applications, virtual machine systems and so on. The generaliza...
Stere Preda, Laurent Toutain, Nora Cuppens-Boulahi...