Sciweavers

4795 search results - page 777 / 959
» The Message Classification Model
Sort
View
CORR
2011
Springer
142views Education» more  CORR 2011»
14 years 9 months ago
A Logical Method for Policy Enforcement over Evolving Audit Logs
We present an iterative algorithm for enforcing policies represented in a first-order logic, which can, in particular, express all transmission-related clauses in the HIPAA Priva...
Deepak Garg, Limin Jia, Anupam Datta
135
Voted
TWC
2011
291views more  TWC 2011»
14 years 9 months ago
On Optimal Cooperator Selection Policies for Multi-Hop Ad Hoc Networks
Abstract—In this paper we consider wireless cooperative multihop networks, where nodes that have decoded the message at the previous hop cooperate in the transmission toward the ...
Michele Rossi, Cristiano Tapparello, Stefano Tomas...
108
Voted
CORR
2010
Springer
114views Education» more  CORR 2010»
14 years 9 months ago
Secure Communication over Parallel Relay Channel
We investigate the problem of secure communication over parallel relay channel in the presence of a passive eavesdropper. We consider a four terminal relay-eavesdropper channel wh...
Zohaib Hassan Awan, Abdellatif Zaidi, Luc Vandendo...
IJNSEC
2010
133views more  IJNSEC 2010»
14 years 9 months ago
Verifiable Attribute Based Encryption
In this paper, we construct two verifiable attribute-based encryption (VABE) schemes. One is with a single authority, and the other is with multi authorities. Not only our schemes ...
Qiang Tang, Dongyao Ji
SEMWEB
2010
Springer
14 years 9 months ago
A taskonomy for the Semantic Web
The modalities of search and browse dominate current thinking about interaction with the Web. Given the Web's origins as a global hypertext system, it is understandable that t...
Tom Heath