Sciweavers

482 search results - page 64 / 97
» Secure Access Control Scheme of RFID System Application
Sort
View
143
Voted
CCGRID
2002
IEEE
15 years 8 months ago
Towards Trust-Aware Resource Management in Grid Computing Systems
Resource management is a central part of a Grid computing system. In a large-scale wide-area system such as the Grid, security is a prime concern. One approach is to be conservati...
Farag Azzedin, Muthucumaru Maheswaran
147
Voted
ASIACRYPT
2010
Springer
15 years 1 months ago
Structured Encryption and Controlled Disclosure
We consider the problem of encrypting structured data (e.g., a web graph or a social network) in such a way that it can be efficiently and privately queried. For this purpose, we ...
Melissa Chase, Seny Kamara
110
Voted
ACSAC
2006
IEEE
15 years 9 months ago
Protecting Privacy in Key-Value Search Systems
This paper investigates the general problem of performing key-value search at untrusted servers without loss of user privacy. Specifically, given key-value pairs from multiple ow...
Yinglian Xie, Michael K. Reiter, David R. O'Hallar...
169
Voted
CAL
2006
15 years 3 months ago
Adopting system call based address translation into user-level communication
User-level communication alleviates the software overhead of the communication subsystem by allowing applications to access the network interface directly. For that purpose, effici...
Moon-Sang Lee, Sang-Kwon Lee, Joonwon Lee, Seung R...
125
Voted
MOBISYS
2007
ACM
16 years 3 months ago
SmokeScreen: flexible privacy controls for presence-sharing
Presence-sharing is an emerging platform for mobile applications, but presence-privacy remains a challenge. Privacy controls must be flexible enough to allow sharing between both ...
Landon P. Cox, Angela Dalton, Varun Marupadi