Sciweavers

5119 search results - page 210 / 1024
» Security Privacy
Sort
View
ICDE
2008
IEEE
131views Database» more  ICDE 2008»
15 years 11 months ago
PLUS: Synthesizing privacy, lineage, uncertainty and security
— Privacy, lineage, uncertainty, and security are important to many information integration efforts, and these “PLUS” properties interact in a number of complex ways. This pa...
Barbara T. Blaustein, Len Seligman, Michael Morse,...
ACSAC
1999
IEEE
15 years 8 months ago
Security Policy Coordination for Heterogeneous Information Systems
Coordinating security policies in information enclaves is challenging due to their heterogeneity and autonomy. Administrators must reconcile the semantic diversity of data and sec...
John Hale, Pablo Galiasso, Mauricio Papa, Sujeet S...
ACISP
2007
Springer
15 years 8 months ago
An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication
This work deals with the security challenges in authentication protocols employing volatile biometric features, where the authentication is indeed a comparison between a fresh biom...
Julien Bringer, Hervé Chabanne, Malika Izab...
ACISP
2003
Springer
15 years 9 months ago
On the Pseudorandomness of KASUMI Type Permutations
KASUMI is a block cipher which has been adopted as a standard of 3GPP. In this paper, we study the pseudorandomness of idealized KASUMI type permutations for adaptive adversaries. ...
Tetsu Iwata, Tohru Yagi, Kaoru Kurosawa
AGENTS
2000
Springer
15 years 8 months ago
SIAS: a secure shopping information agent system
In this paper, we build a Shopping Information Agent System (SIAS) based on mobile agent technology. We discuss possible security attacks by malicious hosts to agents in the syste...
Anthony H. W. Chan, Tsz Yeung Wong, Caris K. M. Wo...