In this paper, we present two fully secure functional encryption schemes. Our first result is a fully secure attribute-based encryption (ABE) scheme. Previous constructions of AB...
Allison B. Lewko, Tatsuaki Okamoto, Amit Sahai, Ka...
Abstract. Dynamic real-time systems function in unpredictable environments and have requirements that span many domains such as time, survivability, and scalability. The system req...
Binoy Ravindran, Lonnie R. Welch, Carl Bruggeman, ...
Designing a secure and dependable system is not just a technical issue, it involves also a deep analysis of the organizational and the social environment in which the system will ...
Yudistira Asnar, Paolo Giorgini, Roberto Bonato, V...
It is now commonly accepted that security and dependability largely represent two different aspects of an overall meta-concept that reflects the trust that we put in a computer s...
We present an active learning approach to choose image annotation requests among both object category labels and the objects’ attribute labels. The goal is to solicit those labe...