Sciweavers

565 search results - page 49 / 113
» A logic for authorization provenance
Sort
View
PET
2012
Springer
11 years 11 months ago
Fault-Tolerant Privacy-Preserving Statistics
Real-time statistics on smart meter consumption data must preserve consumer privacy and tolerate smart meter failures. Existing protocols for this private distributed aggregation m...
Marek Jawurek, Florian Kerschbaum
DBSEC
2003
155views Database» more  DBSEC 2003»
13 years 10 months ago
Schema Based XML Security: RBAC Approach
As a platform-independent solution, XML is going to be used in many environments such as application integration and Web Services. Security of XML instance is a basic problem, esp...
Xinwen Zhang, Jaehong Park, Ravi S. Sandhu
ICLP
2009
Springer
14 years 1 months ago
Integration of Abductive Reasoning and Constraint Optimization in SCIFF
Abstract. Abductive Logic Programming (ALP) and Constraint Logic Programming (CLP) share the feature to constrain the set of possible solutions to a program via integrity or CLP co...
Marco Gavanelli, Marco Alberti, Evelina Lamma
BMCBI
2010
81views more  BMCBI 2010»
13 years 9 months ago
Discrete wavelet transform de-noising in eukaryotic gene splicing
Background: This paper compares the most common digital signal processing methods of exon prediction in eukaryotes, and also proposes a technique for noise suppression in exon pre...
Tina P. George, Tessamma Thomas
CCS
2009
ACM
14 years 9 months ago
Conditional proxy re-encryption secure against chosen-ciphertext attack
In a proxy re-encryption (PRE) scheme [4], a proxy, authorized by Alice, transforms messages encrypted under Alice's public key into encryptions under Bob's public key w...
Jian Weng, Robert H. Deng, Xuhua Ding, Cheng-Kang ...