Sciweavers

184 search results - page 22 / 37
» A TMDM Disclosure Using T
Sort
View
IJHPCN
2006
106views more  IJHPCN 2006»
13 years 10 months ago
Hash chains with diminishing ranges for sensors
Sensors and other small devices that periodically transmit relatively small packets of information motivate the study of hash chains with small domains and ranges. Hash chain based...
Phillip G. Bradford, Olga V. Gavrylyako
CERA
2004
89views more  CERA 2004»
13 years 10 months ago
An Electronic Cash Scheme and its Management
: A secure electronic cash scheme and its role-based access control (RBAC) management are proposed in this paper. The scheme uses electronic cash for payment transactions. In this ...
Hua Wang, Yanchun Zhang, Jinli Cao
ACSW
2007
13 years 11 months ago
The motivation and proposition of a privacy-enhancing architecture for operational databases
To date, research has focussed on privacy from a wide perspective, enabling organisations to implement various technologies that contribute to privacy protection. However, in such...
Kirsten Wahlstrom, Gerald Quirchmayr
ICWS
2008
IEEE
13 years 11 months ago
A Theory of Role Composition
We study the access control integration problem for web services. Organizations frequently use many services, each with its own access control policies, that must interoperate whi...
Jeffrey Fischer, Rupak Majumdar
SDM
2007
SIAM
204views Data Mining» more  SDM 2007»
13 years 11 months ago
Flexible Anonymization For Privacy Preserving Data Publishing: A Systematic Search Based Approach
k-anonymity is a popular measure of privacy for data publishing: It measures the risk of identity-disclosure of individuals whose personal information are released in the form of ...
Bijit Hore, Ravi Chandra Jammalamadaka, Sharad Meh...