Sciweavers

1627 search results - page 148 / 326
» On context in authorization policy
Sort
View
HPDC
1999
IEEE
14 years 2 months ago
An Evaluation of Linear Models for Host Load Prediction
This paper evaluates linear models for predicting the Digital Unix five-second load average from 1 to 30 seconds into the future. A detailed statistical study of a large number of...
Peter A. Dinda, David R. O'Hallaron
DBSEC
2004
83views Database» more  DBSEC 2004»
13 years 11 months ago
Attribute Mutability in Usage Control
The notion of Usage Control (UCON) has been introduced recently to extend traditional access controls by including three decision factors called authorizations, obligations, and co...
Jaehong Park, Xinwen Zhang, Ravi S. Sandhu
CTRSA
2008
Springer
150views Cryptology» more  CTRSA 2008»
14 years 3 days ago
Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY1
Abstract. Camellia and MISTY1 are Feistel block ciphers. In this paper, we observe that, when conducting impossible differential cryptanalysis on Camellia and MISTY1, their round s...
Jiqiang Lu, Jongsung Kim, Nathan Keller, Orr Dunke...
CRYPTO
2012
Springer
234views Cryptology» more  CRYPTO 2012»
12 years 23 days ago
Homomorphic Evaluation of the AES Circuit
We describe a working implementation of leveled homomorphic encryption (without bootstrapping) that can evaluate the AES-128 circuit in three different ways. One variant takes und...
Craig Gentry, Shai Halevi, Nigel P. Smart
EUROCRYPT
2012
Springer
12 years 22 days ago
Fully Homomorphic Encryption with Polylog Overhead
We show that homomorphic evaluation of (wide enough) arithmetic circuits can be accomplished with only polylogarithmic overhead. Namely, we present a construction of fully homomorp...
Craig Gentry, Shai Halevi, Nigel P. Smart