Sciweavers

1790 search results - page 330 / 358
» On Privacy Models for RFID
Sort
View
SACMAT
2009
ACM
14 years 5 months ago
Towards formal security analysis of GTRBAC using timed automata
An access control system is often viewed as a state transition system. Given a set of access control policies, a general safety requirement in such a system is to determine whethe...
Samrat Mondal, Shamik Sural, Vijayalakshmi Atluri
ICDE
2009
IEEE
143views Database» more  ICDE 2009»
15 years 21 days ago
Auditing a Database under Retention Restrictions
Auditing the changes to a database is critical for identifying malicious behavior, maintaining data quality, and improving system performance. But an accurate audit log is a histor...
Wentian Lu, Gerome Miklau
WWW
2009
ACM
14 years 11 months ago
Inferring private information using social network data
On-line social networks, such as Facebook, are increasingly utilized by many users. These networks allow people to publish details about themselves and connect to their friends. S...
Jack Lindamood, Raymond Heatherly, Murat Kantarcio...
PKC
2009
Springer
180views Cryptology» more  PKC 2009»
14 years 11 months ago
Security of Sanitizable Signatures Revisited
Sanitizable signature schemes, as defined by Ateniese et al. (ESORICS 2005), allow a signer to partly delegate signing rights to another party, called the sanitizer. That is, the s...
Anja Lehmann, Christina Brzuska, Dominique Schr&ou...
CHI
2001
ACM
14 years 11 months ago
Single display privacyware: augmenting public displays with private information
The research area of Single Display Groupware (SDG) confronts the standard model of computing interaction, one user working on one computer, by investigating how to best support g...
Garth B. D. Shoemaker, Kori Inkpen