Sciweavers

7064 search results - page 21 / 1413
» From States to Histories
Sort
View
PSD
2004
Springer
108views Database» more  PSD 2004»
14 years 26 days ago
Developing Adoptable Disclosure Protection Techniques: Lessons Learned from a U.S. Experience
The development of new disclosure protection techniques is useful only insofar as those techniques are adopted by statistical agencies. In order for technical experts in disclosure...
Nicholas H. Greenia
ICTAC
2009
Springer
13 years 5 months ago
A First-Order Policy Language for History-Based Transaction Monitoring
Online trading invariably involves dealings between strangers, so it is important for one party to be able to judge objectively the trustworthiness of the other. In such a setting,...
Andreas Bauer 0002, Rajeev Goré, Alwen Tiu
SCN
2010
Springer
143views Communications» more  SCN 2010»
13 years 6 months ago
History-Free Aggregate Message Authentication Codes
Aggregate message authentication codes, as introduced by Katz and Lindell (CT-RSA 2008), combine several MACs into a single value, which has roughly the same size as an ordinary MA...
Oliver Eikemeier, Marc Fischlin, Jens-Fabian G&oum...
POLICY
2007
Springer
14 years 1 months ago
Distributed Enforcement of Unlinkability Policies: Looking Beyond the Chinese Wall
We present a discretionary access control framework that can be used to control a principal’s ability to link information from two or more audit records and compromise a user’...
Apu Kapadia, Prasad Naldurg, Roy H. Campbell
IJCAT
2007
76views more  IJCAT 2007»
13 years 7 months ago
Prediction-based decorators for distributed collaborative haptic virtual environments
Haptic Collaborative Virtual Environments, like other collaborative environments, are adversely affected by the inherent network lag, caused by delay, jitter, or packet loss, when...
Azzedine Boukerche, Shervin Shirmohammadi, Abuhoss...