Sciweavers

1352 search results - page 208 / 271
» Designing Security Requirements Models Through Planning
Sort
View
CCS
2008
ACM
15 years 5 months ago
Authenticated hash tables
Hash tables are fundamental data structures that optimally answer membership queries. Suppose a client stores n elements in a hash table that is outsourced at a remote server so t...
Charalampos Papamanthou, Roberto Tamassia, Nikos T...
POLICY
2007
Springer
15 years 9 months ago
Distributed Enforcement of Unlinkability Policies: Looking Beyond the Chinese Wall
We present a discretionary access control framework that can be used to control a principal’s ability to link information from two or more audit records and compromise a user’...
Apu Kapadia, Prasad Naldurg, Roy H. Campbell
FC
2007
Springer
111views Cryptology» more  FC 2007»
15 years 9 months ago
A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection Against Splitting
A multi-coupon (MC) represents a collection of k coupons that a user can redeem to a vendor in exchange for some goods or services. Nguyen (FC 2006), deepening the ideas of Chen et...
Liqun Chen, Alberto N. Escalante, Hans Löhr, ...
ICCS
2004
Springer
15 years 8 months ago
Demonstrating Wireless IPv6 Access to a Federated Health Record Server
: This paper describes the practical implementation of a federated health record server based on a generic and comprehensive architecture, deployed in a live clinical setting and a...
Dipak Kalra, David Ingram, A. Austin, V. Griffith,...
HOTOS
2007
IEEE
15 years 7 months ago
Processor Hardware Counter Statistics as a First-Class System Resource
Today's processors provide a rich source of statistical information on program execution characteristics through hardware counters. However, traditionally, operating system (...
Xiao Zhang, Sandhya Dwarkadas, Girts Folkmanis, Ka...