Sciweavers

3349 search results - page 3 / 670
» Data Security
Sort
View
IEEEARES
2007
IEEE
14 years 5 months ago
Collection of Quantitative Data on Security Incidents
Quantitative data about security threats is a precondition for a precise assessment of security risks and consequently for an efficient management of information security. Curren...
Thomas Nowey, Hannes Federrath
ESORICS
2007
Springer
14 years 5 months ago
On the Privacy of Concealed Data Aggregation
A formal treatment to the privacy of concealed data aggregation (CDA) is given. While there exist a handful of constructions, rigorous security models and analyses for CDA are stil...
Aldar C.-F. Chan, Claude Castelluccia
SECURWARE
2008
IEEE
14 years 5 months ago
Security Patterns for Capturing Encryption-Based Access Control to Sensor Data
—A security pattern describes a particular recurring security problem that arises in specific contexts, and presents a well-proven generic solution for it [1]. This paper descri...
Ángel Cuevas, Paul El Khoury, Laurent Gomez...
CCS
2011
ACM
12 years 10 months ago
Unicorn: two-factor attestation for data security
Mohammad Mannan, Beom Heyn Kim, Afshar Ganjali, Da...
CCS
2010
ACM
14 years 5 months ago
Attribute based data sharing with attribute revocation
Shucheng Yu, Cong Wang, Kui Ren, Wenjing Lou