Sciweavers

1564 search results - page 236 / 313
» Security in Practice - Security-Usability Chasm
Sort
View
ACNS
2008
Springer
94views Cryptology» more  ACNS 2008»
15 years 4 months ago
Restricted Queries over an Encrypted Index with Applications to Regulatory Compliance
Compliance storage is an increasingly important area for businesses faced with a myriad of new document retention regulations. Today, businesses have turned to Write-One Read Many ...
Nikita Borisov, Soumyadeb Mitra
SP
2007
IEEE
105views Security Privacy» more  SP 2007»
15 years 4 months ago
Multi-Dimensional Range Query over Encrypted Data
We design an encryption scheme called Multi-dimensional Range Query over Encrypted Data (MRQED), to address the privacy concerns related to the sharing of network audit logs and v...
Elaine Shi, John Bethencourt, Hubert T.-H. Chan, D...
CRYPTO
2007
Springer
134views Cryptology» more  CRYPTO 2007»
15 years 4 months ago
Domain Extension of Public Random Functions: Beyond the Birthday Barrier
A public random function is a random function that is accessible by all parties, including the adversary. For example, a (public) random oracle is a public random function {0, 1}â...
Ueli M. Maurer, Stefano Tessaro
POLICY
2007
Springer
15 years 4 months ago
An Automated Framework for Validating Firewall Policy Enforcement
The implementation of network security devices such as ï¬rewalls and IDSs are constantly being improved to accommodate higher security and performance standards. Using reliable a...
Adel El-Atawy, Taghrid Samak, Zein Wali, Ehab Al-S...
SAC
2006
ACM
15 years 3 months ago
Privacy-preserving SVM using nonlinear kernels on horizontally partitioned data
Traditional Data Mining and Knowledge Discovery algorithms assume free access to data, either at a centralized location or in federated form. Increasingly, privacy and security co...
Hwanjo Yu, Xiaoqian Jiang, Jaideep Vaidya