Sciweavers

562 search results - page 55 / 113
» Secure Multiparty Computation with General Interaction Patte...
Sort
View
DRM
2007
Springer
15 years 10 months ago
Data structures for limited oblivious execution of programs while preserving locality of reference
We introduce a data structure for program execution under a limited oblivious execution model. For fully oblivious execution along the lines of Goldreich and Ostrovsky [2], one tr...
Avinash V. Varadarajan, Ramarathnam Venkatesan, C....
HOTNETS
2010
14 years 10 months ago
How to tell an airport from a home: techniques and applications
Today's Internet services increasingly use IP-based geolocation to specialize the content and service provisioning for each user. However, these systems focus almost exclusiv...
Andreas Pitsillidis, Yinglian Xie, Fang Yu, Mart&i...
CHI
2010
ACM
15 years 10 months ago
Detecting professional versus personal closeness using an enterprise social network site
In this work we analyze the behavior on a company-internal social network site to determine which interaction patterns signal closeness between colleagues. Regression analysis sug...
Anna Wu, Joan Morris DiMicco, David R. Millen
CCS
2007
ACM
15 years 8 months ago
Efficient policy analysis for administrative role based access control
Administrative RBAC (ARBAC) policies specify how Role-Based Access Control (RBAC) policies may be changed by each administrator. It is often difficult to fully understand the effe...
Scott D. Stoller, Ping Yang, C. R. Ramakrishnan, M...
HUC
2010
Springer
15 years 5 months ago
Beyond context-awareness: context prediction in an industrial application
In this paper, we discuss the benefits of context prediction for an industrial application in open cast mining. The goal of context prediction is not only to recognize the current...
Yong Ding, Hedda Rahel Schmidtke, Michael Beigl