Sciweavers

360 search results - page 6 / 72
» ccs 2008
Sort
View
CCS
2008
ACM
15 years 1 days ago
EON: modeling and analyzing dynamic access control systems with logic programs
We present EON, a logic-programming language and tool that can be used to model and analyze dynamic access control systems. Our language extends Datalog with some carefully design...
Avik Chaudhuri, Prasad Naldurg, Sriram K. Rajamani...
CCS
2008
ACM
15 years 1 days ago
Rootkit-resistant disks
Rootkits are now prevalent in the wild. Users affected by rootkits are subject to the abuse of their data and resources, often unknowingly. Such malware becomes even more dangerou...
Kevin R. B. Butler, Stephen E. McLaughlin, Patrick...
CCS
2008
ACM
15 years 1 days ago
Traitor tracing with constant size ciphertext
A traitor tracing system enables a publisher to trace a pirate decryption box to one of the secret keys used to create the box. We present a traitor tracing system where ciphertex...
Dan Boneh, Moni Naor
CCS
2008
ACM
15 years 1 days ago
Private combinatorial group testing
Combinatorial group testing, given a set C of individuals ("customers"), consists of applying group tests on subsets of C for the purpose of identifying which members of...
Mikhail J. Atallah, Keith B. Frikken, Marina Blant...
JNW
2008
103views more  JNW 2008»
14 years 10 months ago
Avoidance Mechanism of Redundant Transmissions in Content Cruising System
"Content Cruising System (CCS)" is developed as a decentralized and autonomous distribution system for location-based contents. The content put into CCS carries itself to...
Takaaki Ishida, Keijiro Ehara, Seiichiro Toda, Yas...