Sciweavers

1120 search results - page 7 / 224
» Securely sharing neuroimagery
Sort
View
48
Voted
JOT
2007
62views more  JOT 2007»
15 years 4 days ago
UML-based Approach to Specify Secured, Fine-grained Concurrent Access to Shared Resources
Jagadish Suryadevara, R. K. Shyamasundar
102
Voted
ISCI
2011
14 years 6 months ago
Space efficient secret sharing for implicit data security
Abhishek Parakh, Subhash Kak
SOCIALCOM
2010
14 years 10 months ago
Securing Shareable Life-logs
Sharing life-log information in a social community has many advantages, both for the user and society. But sharing any type of personal information is a threat to privacy. In parti...
Reza Rawassizadeh, A Min Tjoa
CORR
2010
Springer
82views Education» more  CORR 2010»
15 years 10 days ago
Secret Sharing and Proactive Renewal of Shares in Hierarchical Groups
Secret sharing in user hierarchy represents a challenging area for research. Although a lot of work has already been done in this direction, this paper presents a novel approach t...
Ruchira Naskar, Indranil Sengupta
OOPSLA
2000
Springer
15 years 3 months ago
An approach to safe object sharing
It is essential for security to be able to isolate mistrusting programs from one another, and to protect the host platform from programs. Isolation is difficult in object-oriented...
Ciarán Bryce, Chrislain Razafimahefa