Sciweavers

2270 search results - page 221 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
PAIRING
2007
Springer
148views Cryptology» more  PAIRING 2007»
15 years 10 months ago
Fully Collusion Secure Dynamic Broadcast Encryption with Constant-Size Ciphertexts or Decryption Keys
This paper puts forward new efficient constructions for public-key broadcast encryption that simultaneously enjoy the following properties: receivers are stateless; encryption is c...
Cécile Delerablée, Pascal Paillier, ...
CIMCA
2006
IEEE
15 years 10 months ago
A Knowledge-based Security Policy Framework for Business Process Management
Business Process Management (BPM) is often a key component of the business change. Business rules, whether embedded within BPM or on their own, have begun playing an ever-increasi...
Dong Huang, Yi Yang, Jacques Calmet
DBSEC
2010
162views Database» more  DBSEC 2010»
15 years 6 months ago
Distributed and Secure Access Control in P2P Databases
The intent of peer data management systems (PDMS) is to share as much data as possible. However, in many applications leveraging sensitive data, users demand adequate mechanisms to...
Angela Bonifati, Ruilin Liu, Hui (Wendy) Wang
GI
2009
Springer
15 years 2 months ago
Rao-Blackwellized Particle Filter for Security Surveillance
: Nowadays, the necessity of safeguarded environments is stronger than ever. The defence of public areas against terroristic threats requires intelligent security assistance system...
Felix Govaers, Monika Wieneke
CRYPTO
2001
Springer
152views Cryptology» more  CRYPTO 2001»
15 years 9 months ago
Secure Distributed Linear Algebra in a Constant Number of Rounds
Consider a network of processors among which elements in a finite field K can be verifiably shared in a constant number of rounds. Assume furthermore constant-round protocols ar...
Ronald Cramer, Ivan Damgård