Sciweavers

2715 search results - page 163 / 543
» Database Publication Practices
Sort
View
CHI
2006
ACM
14 years 8 months ago
BashoCam: collective photographic sequencing in wireless P2P networks
Wireless peer-to-peer network technology enables new types of collaborative practices among people in public space and across multiple locations. BashoCam is an on-going project t...
Lalya Gaye, Svante Hermansson, Lars Erik Holmquist
ESORICS
2008
Springer
13 years 10 months ago
User Privacy in Transport Systems Based on RFID E-Tickets
Abstract. Recently, operators of public transportation in many countries started to roll out electronic tickets (e-tickets). E-tickets offer several advantages to transit enterpris...
Ahmad-Reza Sadeghi, Ivan Visconti, Christian Wachs...
IJISEC
2010
114views more  IJISEC 2010»
13 years 5 months ago
A new hardware-assisted PIR with O(n) shuffle cost
Abstract Since the concept of private information retrieval (PIR) was first formalized by Chor et. al, various constructions have been proposed with a common goal of reducing commu...
Xuhua Ding, Yanjiang Yang, Robert H. Deng, Shuhong...
DBSEC
2009
130views Database» more  DBSEC 2009»
13 years 9 months ago
Implementing Reflective Access Control in SQL
Reflective Database Access Control (RDBAC) is a model in which a database privilege is expressed as a database query itself, rather than as a static privilege in an access control ...
Lars E. Olson, Carl A. Gunter, William R. Cook, Ma...
SIGMOD
2008
ACM
119views Database» more  SIGMOD 2008»
14 years 8 months ago
Report on the Principles of Provenance Workshop
Provenance, or records of the origin, context, custody, derivation or other historical information about a (digital) object, has recently become an important research topic in a n...
James Cheney, Peter Buneman, Bertram Ludäscher