Sciweavers

1790 search results - page 296 / 358
» On Privacy Models for RFID
Sort
View
SDMW
2004
Springer
15 years 8 months ago
Abstracting and Refining Authorization in SQL
ing and Refining Authorization in SQL Arnon Rosenthal, Edward Sciore1 The SQL standard specifies authorization via a large set of rather opaque rules, which are difficult to unders...
Arnon Rosenthal, Edward Sciore
133
Voted
SPW
2004
Springer
15 years 8 months ago
Safe and Private Data Sharing with Turtle: Friends Team-Up and Beat the System
In this paper we describe Turtle, a peer-to-peer architecture for safe sharing of sensitive data. The truly revolutionary aspect of Turtle rests in its novel way of dealing with t...
Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenba...
FUN
2010
Springer
254views Algorithms» more  FUN 2010»
15 years 8 months ago
The Urinal Problem
Abstract. A man walks into a men’s room and observes n empty urinals. Which urinal should he pick so as to maximize his chances of maintaining privacy, i.e., minimize the chance ...
Evangelos Kranakis, Danny Krizanc
HAIS
2009
Springer
15 years 8 months ago
An Evolutionary Ensemble-Based Method for Rule Extraction with Distributed Data
This paper presents a methodology for knowledge discovery from inherently distributed data without moving it from its original location, completely or partially, to other locations...
Diego M. Escalante, Miguel Angel Rodriguez, Antoni...
ECCV
2010
Springer
15 years 8 months ago
Seeing through Obscure Glass
Obscure glass is textured glass designed to separate spaces and “obscure” visibility between the spaces. Such glass is used to provide privacy while still allowing light to fl...