Sciweavers

26 search results - page 4 / 6
» Share your data, Keep your secrets
Sort
View
ICDCS
2003
IEEE
13 years 11 months ago
Responsive Security for Stored Data
We present the design of a distributed store that offers various levels of security guarantees while tolerating a limited number of nodes that are compromised by an adversary. The...
Subramanian Lakshmanan, Mustaque Ahamad, H. Venkat...
CCS
2006
ACM
13 years 10 months ago
Attribute-based encryption for fine-grained access control of encrypted data
As more sensitive data is shared and stored by third-party sites on the Internet, there will be a need to encrypt data stored at these sites. One drawback of encrypting data, is t...
Vipul Goyal, Omkant Pandey, Amit Sahai, Brent Wate...
GECCO
2009
Springer
131views Optimization» more  GECCO 2009»
13 years 4 months ago
A multi-objective approach to data sharing with privacy constraints and preference based objectives
Public data sharing is utilized in a number of businesses to facilitate the exchange of information. Privacy constraints are usually enforced to prevent unwanted inference of info...
Rinku Dewri, Darrell Whitley, Indrajit Ray, Indrak...
WISE
2009
Springer
14 years 3 months ago
Facing Tagging Data Scattering
Web2.0 has brought tagging at the forefront of user practises for organizing and locating resources. Unfortunately, these tagging efforts suffer from a main drawback: lack of inter...
Oscar Díaz, Jon Iturrioz, Cristóbal ...
INTERNET
2007
113views more  INTERNET 2007»
13 years 6 months ago
REST Eye for the SOA Guy
it’s hardly Earth-shattering: abstracting your business services and separating them from your applications can yield an overall system that’s easier to build, maintain, and ex...
Steve Vinoski