Sciweavers

804 search results - page 130 / 161
» How to Break Access Control in a Controlled Manner
Sort
View
TCC
2007
Springer
114views Cryptology» more  TCC 2007»
15 years 10 months ago
Multi-authority Attribute Based Encryption
Abstract. In an identity based encryption scheme, each user is identified by a unique identity string. An attribute based encryption scheme (ABE), in contrast, is a scheme in whic...
Melissa Chase
ICAT
2006
IEEE
15 years 10 months ago
Study on Data Collaboration Service for Collaborative Virtual Geographic Environment
The use of Collaborative Virtual Geographic Environments (CVGE) is one of the most promising uses of virtual reality in geographic field. Data collaboration can support multi-direc...
Jun Zhu, Jianhua Gong, Hua Qi, Tao Song
SP
2006
IEEE
110views Security Privacy» more  SP 2006»
15 years 10 months ago
Privacy and Contextual Integrity: Framework and Applications
Contextual integrity is a conceptual framework for understanding privacy expectations and their implications developed in the literature on law, public policy, and political philo...
Adam Barth, Anupam Datta, John C. Mitchell, Helen ...
CSFW
2005
IEEE
15 years 10 months ago
Nomad: A Security Model with Non Atomic Actions and Deadlines
Modelling security policies requires means to specify permissions and prohibitions. However, this is generally not sufficient to express security properties such as availability ...
Frédéric Cuppens, Nora Cuppens-Boula...
ICCV
2005
IEEE
15 years 10 months ago
Perceptive User Interface, a Generic Approach
Abstract. This paper describes the development of a real-time perceptive user interface. Two cameras are used to detect a user’s head, eyes, hand, fingers and gestures. These cu...
Michael Van den Bergh, Ward Servaes, Geert Caenen,...