Sciweavers

1779 search results - page 219 / 356
» A Formal Model of Data Privacy
Sort
View
ICDT
2003
ACM
132views Database» more  ICDT 2003»
15 years 9 months ago
Probabilistic Interval XML
Interest in XML databases has been growing over the last few years. In this paper, we study the problem of incorporating probabilistic information into XML databases. We propose th...
Edward Hung, Lise Getoor, V. S. Subrahmanian
ESORICS
2004
Springer
15 years 10 months ago
Signature Bouquets: Immutability for Aggregated/Condensed Signatures
Database outsourcing is a popular industry trend which involves organizations delegating their data management needs to an external service provider. In this model, a service prov...
Einar Mykletun, Maithili Narasimha, Gene Tsudik
CRYPTO
2003
Springer
87views Cryptology» more  CRYPTO 2003»
15 years 9 months ago
Private Circuits: Securing Hardware against Probing Attacks
Can you guarantee secrecy even if an adversary can eavesdrop on your brain? We consider the problem of protecting privacy in circuits, when faced with an adversary that can access ...
Yuval Ishai, Amit Sahai, David Wagner
ISCI
2008
86views more  ISCI 2008»
15 years 4 months ago
New (t, n) threshold directed signature scheme with provable security
Directed signature scheme allows only a designated verifier to check the validity of the signature issued to him; and at the time of trouble or if necessary, any third party can v...
Rongxing Lu, Xiaodong Lin, Zhenfu Cao, Jun Shao, X...
WSC
2008
15 years 6 months ago
How to build valid and credible simulation models
In this tutorial we present techniques for building valid and credible simulation models. Ideas to be discussed include the importance of a definitive problem formulation, discuss...
Averill M. Law