Sciweavers

3452 search results - page 28 / 691
» Secure Data Outsourcing
Sort
View
113
Voted
CCS
2011
ACM
14 years 5 months ago
Unicorn: two-factor attestation for data security
Mohammad Mannan, Beom Heyn Kim, Afshar Ganjali, Da...
124
Voted
ESORICS
2007
Springer
15 years 11 months ago
On the Privacy of Concealed Data Aggregation
A formal treatment to the privacy of concealed data aggregation (CDA) is given. While there exist a handful of constructions, rigorous security models and analyses for CDA are stil...
Aldar C.-F. Chan, Claude Castelluccia
102
Voted
CCS
2010
ACM
15 years 12 months ago
Attribute based data sharing with attribute revocation
Shucheng Yu, Cong Wang, Kui Ren, Wenjing Lou
141
Voted
ACSAC
2008
IEEE
15 years 11 months ago
Bridging the Gap between Data-Flow and Control-Flow Analysis for Anomaly Detection
Peng Li, Hyundo Park, Debin Gao, Jianming Fu
SP
2006
IEEE
129views Security Privacy» more  SP 2006»
15 years 11 months ago
Practical Inference Control for Data Cubes (Extended Abstract)
Yingjiu Li, Haibing Lu, Robert H. Deng