Sciweavers

726 search results - page 80 / 146
» An Access Control Scheme for Protecting Personal Data
Sort
View
IANDC
2008
140views more  IANDC 2008»
13 years 7 months ago
Information flow security in Boundary Ambients
A variant of the Mobile Ambient calculus, called Boundary Ambients, is introduced, supporting the modelling of multi-level security policies. Ambients that may guarantee to proper...
Chiara Braghin, Agostino Cortesi, Riccardo Focardi
OZCHI
2006
ACM
14 years 1 months ago
Question-based group authentication
There are various situations where a distinction needs to be made between group members and outsiders. For example, to protect students in chat groups from unpleasant incidents ca...
Ann Nosseir, Richard C. H. Connor, Karen Renaud
NDSS
2006
IEEE
14 years 1 months ago
Trust Negotiation with Hidden Credentials, Hidden Policies, and Policy Cycles
In an open environment such as the Internet, the decision to collaborate with a stranger (e.g., by granting access to a resource) is often based on the characteristics (rather tha...
Keith B. Frikken, Jiangtao Li, Mikhail J. Atallah
SPIESR
1998
239views Database» more  SPIESR 1998»
13 years 9 months ago
Robust Embedded Data from Wavelet Coefficients
An approach to embedding gray scale images using a discrete wavelet transform is proposed. The proposed scheme enables using signature images that could be as much as 25% of the h...
Jong Jin Chae, B. S. Manjunath
ISCA
2006
IEEE
123views Hardware» more  ISCA 2006»
14 years 1 months ago
Improving Cost, Performance, and Security of Memory Encryption and Authentication
Protection from hardware attacks such as snoopers and mod chips has been receiving increasing attention in computer architecture. This paper presents a new combined memory encrypt...
Chenyu Yan, Daniel Englender, Milos Prvulovic, Bri...