Sciweavers

233 search results - page 39 / 47
» Distributed Privacy Preserving Information Sharing
Sort
View
FC
2005
Springer
87views Cryptology» more  FC 2005»
14 years 3 months ago
Protecting Secret Data from Insider Attacks
We consider defenses against confidentiality and integrity attacks on data following break-ins, or so-called intrusion resistant storage technologies. We investigate the problem o...
David Dagon, Wenke Lee, Richard J. Lipton
IPPS
2005
IEEE
14 years 3 months ago
Virtual Gateways in the DECOS Integrated Architecture
— The DECOS architecture aims at combining the advantages of federated and integrated systems. The DECOS architecture divides the overall system into a set of nearly-independent ...
Roman Obermaisser, Philipp Peti, Hermann Kopetz
CCS
2008
ACM
13 years 12 months ago
The risk-utility tradeoff for IP address truncation
Network operators are reluctant to share traffic data due to security and privacy concerns. Consequently, there is a lack of publicly available traces for validating and generaliz...
Martin Burkhart, Daniela Brauckhoff, Martin May, E...
COOPIS
2003
IEEE
14 years 3 months ago
Advertising Games for Web Services
In: Proceedings of the Eleventh International Conference on Cooperative Information Systems (CoopIS-03), pp. 93–109, Springer-Verlag LNCS Series. c 2003 by Springer-Verlag. We a...
Alessandro Agostini, Paolo Avesani
HICSS
2003
IEEE
145views Biometrics» more  HICSS 2003»
14 years 3 months ago
The DISCIPLE System for Collaboration over the Heterogeneous Web
With the proliferation of mobile devices we witness an increasing demand for supporting collaboration among users working in the field and in the office. A key component for colla...
Allan Meng Krebs, Mihail F. Ionescu, Bogdan Doroho...