Sciweavers

1779 search results - page 188 / 356
» A Formal Model of Data Privacy
Sort
View
DCOSS
2007
Springer
15 years 11 months ago
A Semantics-Based Middleware for Utilizing Heterogeneous Sensor Networks
With the proliferation of various kinds of sensor networks, we will see large amounts of heterogeneous data. They have different characteristics such as data content, formats, mod...
Eric Bouillet, Mark Feblowitz, Zhen Liu, Anand Ran...
ESORICS
2009
Springer
16 years 5 months ago
Secure Evaluation of Private Linear Branching Programs with Medical Applications
Abstract. Diagnostic and classification algorithms play an important role in data analysis, with applications in areas such as health care, fault diagnostics, or benchmarking. Bran...
Mauro Barni, Pierluigi Failla, Vladimir Kolesnikov...
ESORICS
2004
Springer
15 years 10 months ago
Portable and Flexible Document Access Control Mechanisms
We present and analyze portable access control mechanisms for large data repositories, in that the customized access policies are stored on a portable device (e.g., a smart card). ...
Mikhail J. Atallah, Marina Bykova
ACISP
2009
Springer
15 years 11 months ago
Building Key-Private Public-Key Encryption Schemes
In the setting of identity-based encryption with multiple trusted authorities, TA anonymity formally models the inability of an adversary to distinguish two ciphertexts correspondi...
Kenneth G. Paterson, Sriramkrishnan Srinivasan
WPES
2003
ACM
15 years 10 months ago
Anonymous credentials with biometrically-enforced non-transferability
We present a model and protocol for anonymous credentials. Rather than using deterrents to ensure non-transferability, our model uses secure hardware with biometric authentication...
Russell Impagliazzo, Sara Miner More