Sciweavers

516 search results - page 31 / 104
» Comparing Two Information Flow Security Properties
Sort
View
INFOCOM
2005
IEEE
14 years 2 months ago
Distributed algorithms for secure multipath routing
— To proactively defend against intruders from readily jeopardizing single-path data sessions, we propose a distributed secure multipath solution to route data across multiple pa...
Patrick P. C. Lee, Vishal Misra, Dan Rubenstein
IEEEIAS
2009
IEEE
14 years 3 months ago
Action-Based Access Control for Web Services
: Web services over the Internet are widely used nowadays. The problem of secure access to Web-based systems is of great importance naturally. Compared with the existing models, th...
FengHua Li, Wei Wang, Jianfeng Ma, Haoxin Su
CANS
2010
Springer
150views Cryptology» more  CANS 2010»
13 years 6 months ago
Predicate Encryption with Partial Public Keys
Abstract. Predicate encryption is a new powerful cryptographic primitive which allows for fine-grained access control for encrypted data: the owner of the secret key can release pa...
Carlo Blundo, Vincenzo Iovino, Giuseppe Persiano
SIGIR
2008
ACM
13 years 8 months ago
Separate and inequal: preserving heterogeneity in topical authority flows
Web pages, like people, are often known by others in a variety of contexts. When those contexts are sufficiently distinct, a page's importance may be better represented by mu...
Lan Nie, Brian D. Davison
MMM
2007
Springer
105views Multimedia» more  MMM 2007»
14 years 3 months ago
Discovering User Information Goals with Semantic Website Media Modeling
In this work we present an approach to capture the total semantics in multimedia-multimodal web pages. Our research improves upon the state-ofthe-art with two key features: (1) cap...
Bibek Dev Bhattarai, Mike Wong, Rahul Singh