Sciweavers

6907 search results - page 162 / 1382
» Securing distributed adaptation
Sort
View
CCS
2003
ACM
15 years 3 months ago
Establishing pairwise keys in distributed sensor networks
Pairwise key establishment is a fundamental security service in sensor networks; it enables sensor nodes to communicate securely with each other using cryptographic techniques. Ho...
Donggang Liu, Peng Ning
SACMAT
2005
ACM
15 years 3 months ago
Adaptive trust negotiation and access control
Electronic transactions regularly occur between business partners in separate security domains. Trust negotiation is an approach that provides an open authentication and access-co...
Tatyana Ryutov, Li Zhou, B. Clifford Neuman, Travi...
EUROCRYPT
2007
Springer
15 years 4 months ago
Simulatable Adaptive Oblivious Transfer
We study an adaptive variant of oblivious transfer in which a sender has N messages, of which a receiver can adaptively choose to receive k one-after-the-other, in such a way that ...
Jan Camenisch, Gregory Neven, Abhi Shelat
87
Voted
DMDW
2000
118views Management» more  DMDW 2000»
14 years 11 months ago
View security as the basis for data warehouse security
Access. permissions in a data warehouse are currently managed in a separate world from the sources' policies. The consequences are inconsistencies, slow response to change, a...
Arnon Rosenthal, Edward Sciore
ICDCSW
2006
IEEE
15 years 4 months ago
Concurrency Tradeoffs in Dynamic Adaptation
Software systems need to adapt as requirements change, environment conditions vary, and bugs are discovered and fixed. In context of verification of these adaptive systems, the ...
Karun N. Biyani, Sandeep S. Kulkarni