Sciweavers

168 search results - page 26 / 34
» E-Prime for security: a new security paradigm
Sort
View
EDBT
2010
ACM
181views Database» more  EDBT 2010»
13 years 7 months ago
Private record matching using differential privacy
Private matching between datasets owned by distinct parties is a challenging problem with several applications. Private matching allows two parties to identify the records that ar...
Ali Inan, Murat Kantarcioglu, Gabriel Ghinita, Eli...
CRYPTO
2008
Springer
98views Cryptology» more  CRYPTO 2008»
13 years 10 months ago
One-Time Programs
Abstract. In this work, we introduce one-time programs, a new computational paradigm geared towards security applications. A one-time program can be executed on a single input, who...
Shafi Goldwasser, Yael Tauman Kalai, Guy N. Rothbl...
SRDS
2003
IEEE
14 years 1 months ago
Federation Web: A Scheme to Compound Authorization Chains on Large-Scale Distributed Systems
Traditional security systems are not easily scalable and can become single points of failure or performance bottlenecks when used on a large-scale distributed system such as the I...
Altair Olivo Santin, Joni da Silva Fraga, Frank Si...
GCC
2003
Springer
14 years 1 months ago
The Design and Implementation of the GridLab Information Service
The grid computing paradigm emerged recently as a new field distinguished from traditional distributed computing because of its focus on large-scale resource sharing and innovativ...
Giovanni Aloisio, Massimo Cafaro, Italo Epicoco, D...
DBSEC
2007
112views Database» more  DBSEC 2007»
13 years 10 months ago
Reliable Delivery of Event Data from Sensors to Actuators in Pervasive Computing Environments
Abstract. The event-condition-action (ECA) paradigm holds enormous potential in pervasive computing environments. However, the problem of reliable delivery of event data, generated...
Sudip Chakraborty, Nayot Poolsappasit, Indrajit Ra...