Sciweavers

16843 search results - page 77 / 3369
» On Generalized Authorization Problems
Sort
View
CCS
2008
ACM
13 years 10 months ago
Black-box accountable authority identity-based encryption
A well-known concern in the setting of identity based encryption is that the PKG is all powerful and has to be completely trusted. To mitigate this problem, the notion of Accounta...
Vipul Goyal, Steve Lu, Amit Sahai, Brent Waters
CCS
2007
ACM
14 years 2 months ago
A data outsourcing architecture combining cryptography and access control
Data outsourcing is becoming today a successful solution that allows users and organizations to exploit external servers for the distribution of resources. Some of the most challe...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...
AH
2000
Springer
14 years 15 days ago
Adaptation Control in Adaptive Hypermedia Systems
A hypermedia application offers its users a lot of freedom to navigate through a large hyperspace, described by a domain model. Adaptive hypermedia systems (AHS) aim at overcoming ...
Hongjing Wu, Paul De Bra, A. T. M. Aerts, Geert-Ja...
CSUR
1999
159views more  CSUR 1999»
13 years 7 months ago
Hubs, authorities, and communities
The Web can be naturally modeled as a directed graph, consisting of a set of abstract nodes (the pages) joined by directional edges (the hyperlinks). Hyperlinks encode a considerab...
Jon M. Kleinberg
CORR
2007
Springer
75views Education» more  CORR 2007»
13 years 8 months ago
Polyhedral representation conversion up to symmetries
We give a short survey on computational techniques which can be used to solve the representation conversion problem for polyhedra up to symmetries. In particular we discuss decompo...
David Bremner, Mathieu Dutour Sikiric, Achill Sch&...