Sciweavers

14704 search results - page 2643 / 2941
» computing 2007
Sort
View
131
Voted
TCC
2007
Springer
124views Cryptology» more  TCC 2007»
15 years 10 months ago
Tackling Adaptive Corruptions in Multicast Encryption Protocols
We prove a computational soundness theorem for symmetric-key encryption protocols that can be used to analyze security against adaptively corrupting adversaries (that is, adversar...
Saurabh Panjwani
138
Voted
VAMOS
2007
Springer
15 years 10 months ago
Exploring the Dimensions of Variability: a Requirements Engineering Perspective
Goal models have been found to be effective for representing and analyzing variability at the early requirements level, by comprehensibly representing all alternative ways by whic...
Sotirios Liaskos, Lei Jiang, Alexei Lapouchnian, Y...
136
Voted
VLDB
2007
ACM
89views Database» more  VLDB 2007»
15 years 10 months ago
GhostDB: Hiding Data from Prying Eyes
Imagine that you have been entrusted with private data, such as corporate product information, sensitive government information, or symptom and treatment information about hospita...
Christophe Salperwyck, Nicolas Anciaux, Mehdi Benz...
133
Voted
VLDB
2007
ACM
166views Database» more  VLDB 2007»
15 years 10 months ago
To Share or Not To Share?
Intuitively, aggressive work sharing among concurrent queries in a database system should always improve performance by eliminating redundant computation or data accesses. We show...
Ryan Johnson, Nikos Hardavellas, Ippokratis Pandis...
VLDB
2007
ACM
115views Database» more  VLDB 2007»
15 years 10 months ago
The Boundary Between Privacy and Utility in Data Publishing
We consider the privacy problem in data publishing: given a database instance containing sensitive information “anonymize” it to obtain a view such that, on one hand attackers...
Vibhor Rastogi, Sungho Hong, Dan Suciu
« Prev « First page 2643 / 2941 Last » Next »