Sciweavers

69 search results - page 9 / 14
» Encryption policies for regulating access to outsourced data
Sort
View
BIRTHDAY
2008
Springer
13 years 9 months ago
Secure Data Flow in a Calculus for Context Awareness
Abstract. We present a Mobile-Ambients-based process calculus to describe context-aware computing in an infrastructure-based Ubiquitous Computing setting. In our calculus, computin...
Doina Bucur, Mogens Nielsen
IJISEC
2006
113views more  IJISEC 2006»
13 years 7 months ago
Escrow-free encryption supporting cryptographic workflow
Since Boneh and Franklin published their seminal paper on identity based encryption (IBE) using the Weil pairing , there has been a great deal of interest in cryptographic primitiv...
Sattam S. Al-Riyami, John Malone-Lee, Nigel P. Sma...
SRDS
2003
IEEE
14 years 27 days ago
Pesto Flavoured Security
We demonstrate that symmetric-key cryptography can be used for both read and write access control. One-time write access can be granted by handing over an encryption key, and our ...
Feike W. Dillema, Tage Stabell-Kulø
GCC
2003
Springer
14 years 26 days ago
Constructing Secure Web Service Based on XML
The paper discusses XML security key technologies related with security of Web service. Based on these discussions, Web service is integrated with some mature security architecture...
Shaomin Zhang, Baoyi Wang, Lihua Zhou
HICSS
2007
IEEE
114views Biometrics» more  HICSS 2007»
14 years 2 months ago
A History of Indonesian Telecommunication Reform 1999-2006
This study examines the effect of Indonesia’s telecommunications policy on Internet access and the digital divide. The study finds that current government policy had minimal imp...
Susan Eick