Sciweavers

3420 search results - page 533 / 684
» A Language-Based Approach to Security
Sort
View
110
Voted
CIKM
2008
Springer
15 years 4 months ago
Privacy-preserving data publishing for horizontally partitioned databases
There is an increasing need for sharing data repositories containing personal information across multiple distributed, possibly untrusted, and private databases. Such data sharing...
Pawel Jurczyk, Li Xiong
138
Voted
DFT
2008
IEEE
182views VLSI» more  DFT 2008»
15 years 4 months ago
Hardware Trojan Detection and Isolation Using Current Integration and Localized Current Analysis
This paper addresses a new threat to the security of integrated circuits (ICs). The migration of IC fabrication to untrusted foundries has made ICs vulnerable to malicious alterat...
Xiaoxiao Wang, Hassan Salmani, Mohammad Tehranipoo...
102
Voted
FIS
2008
15 years 4 months ago
A Framework for Selecting Trusted Semantic Web Services
Trusted semantic Web services might play a key role in the Future Internet. In this paper, we describe WSTO our comprehensive trust based framework supporting the selection and inv...
Stefania Galizia, Alessio Gugliotta
96
Voted
DAGSTUHL
2007
15 years 4 months ago
Towards a General Framework for Modelling Roles
Role is a widespread concept, it is used in many areas like MAS, Programming Languages, Organizations, Security and OO modelling. Unfortunately, it seems that the literature is not...
Valerio Genovese
134
Voted
DBSEC
2007
106views Database» more  DBSEC 2007»
15 years 4 months ago
Enforcing Honesty in Assured Information Sharing Within a Distributed System
The growing number of distributed information systems such as the internet has created a need for security in data sharing. When several autonomous parties attempt to share data, t...
Ryan Layfield, Murat Kantarcioglu, Bhavani M. Thur...