Sciweavers

5891 search results - page 171 / 1179
» On the Computational Security of a Distributed Key Distribut...
Sort
View
ICDM
2010
IEEE
189views Data Mining» more  ICDM 2010»
15 years 1 months ago
S4: Distributed Stream Computing Platform
Abstract--S4 is a general-purpose, distributed, scalable, partially fault-tolerant, pluggable platform that allows programmers to easily develop applications for processing continu...
Leonardo Neumeyer, Bruce Robbins, Anish Nair, Anan...
CONTEXT
2003
Springer
15 years 9 months ago
A Generic Framework for Context-Based Distributed Authorizations
In conventional security systems, protected resources such as documents, hardware devices and software applications follow an On/Off access policy. On, allows to grant access and ...
Ghita Kouadri Mostéfaoui, Patrick Bré...
ESORICS
2005
Springer
15 years 10 months ago
Machine-Checked Security Proofs of Cryptographic Signature Schemes
Abstract. Formal methods have been extensively applied to the certification of cryptographic protocols. However, most of these works make the perfect cryptography assumption, i.e....
Sabrina Tarento
NDSS
2009
IEEE
15 years 11 months ago
Two-Party Computation Model for Privacy-Preserving Queries over Distributed Databases
Many existing privacy-preserving techniques for querying distributed databases of sensitive information do not scale for large databases due to the use of heavyweight cryptographi...
Sherman S. M. Chow, Jie-Han Lee, Lakshminarayanan ...
RE
2001
Springer
15 years 9 months ago
An Empirical Study of Facilitation of Computer-Mediated Distributed Requirements Negotiations
Group facilitation is an important element of group approaches to Requirements Engineering (RE). The facilitation in ‘traditional’ face-to-face groups is challenged by the inc...
Daniela E. Damian, Mildred L. G. Shaw, Armin Eberl...