Sciweavers

1403 search results - page 119 / 281
» Security Model for XML Data
Sort
View
ACSAC
2009
IEEE
15 years 11 months ago
Protecting Kernel Code and Data with a Virtualization-Aware Collaborative Operating System
Abstract—The traditional virtual machine usage model advocates placing security mechanisms in a trusted VM layer and letting the untrusted guest OS run unaware of the presence of...
Daniela Alvim Seabra de Oliveira, Shyhtsun Felix W...
CSREAEEE
2006
88views Business» more  CSREAEEE 2006»
15 years 6 months ago
Documentation Tool: An Object Oriented Model for Electronic Library Management
This work is in the domain of Electronic Document Management (EDM) [1]. The documents can be an electronic writing, an image, a sound file, a network protocol message, a set of da...
Saad Harous, Djamila Mechta, Mahieddine Djoudi
204
Voted
VLDB
2007
ACM
295views Database» more  VLDB 2007»
15 years 10 months ago
From Data Privacy to Location Privacy: Models and Algorithms
This tutorial presents the definition, the models and the techniques of location privacy from the data privacy perspective. By reviewing and revising the state of art research in ...
Ling Liu
CORR
2006
Springer
100views Education» more  CORR 2006»
15 years 4 months ago
Authorised Translations of Electronic Documents
A concept is proposed to extend authorised translations of documents to electronically signed, digital documents. Central element of the solution is an electronic seal, embodied a...
Jan Piechalski, Andreas U. Schmidt
136
Voted
TCC
2005
Springer
169views Cryptology» more  TCC 2005»
15 years 10 months ago
Chosen-Ciphertext Security of Multiple Encryption
Encryption of data using multiple, independent encryption schemes (“multiple encryption”) has been suggested in a variety of contexts, and can be used, for example, to protect ...
Yevgeniy Dodis, Jonathan Katz