Sciweavers

813 search results - page 153 / 163
» Pipeline-centric provenance model
Sort
View
NDSS
2003
IEEE
14 years 28 days ago
Proactive Two-Party Signatures for User Authentication
We study proactive two-party signature schemes in the context of user authentication. A proactive two-party signature scheme (P2SS) allows two partiesā€”the client and the serverā...
Antonio Nicolosi, Maxwell N. Krohn, Yevgeniy Dodis...
SI3D
2003
ACM
14 years 27 days ago
Large haptic topographic maps: marsview and the proxy graph algorithm
In this paper we develop an interactive 3D browser for large topographic maps using a visual display augmented by a haptic, or force feedback, display. The extreme size of our dat...
Sean P. Walker, John Kenneth Salisbury Jr.
ICPADS
2002
IEEE
14 years 18 days ago
Sago: A Network Resource Management System for Real-Time Content Distribution
Abstractā€” Content replication and distribution is an effective technology to reduce the response time for web accesses and has been proven quite popular among large Internet cont...
Tzi-cker Chiueh, Kartik Gopalan, Anindya Neogi, Ch...
EUROCRYPT
2010
Springer
14 years 14 days ago
Bounded Key-Dependent Message Security
We construct the ļ¬rst public-key encryption scheme that is proven secure (in the standard model, under standard assumptions) even when the attacker gets access to encryptions of ...
Boaz Barak, Iftach Haitner, Dennis Hofheinz, Yuval...
SACMAT
2009
ACM
14 years 9 days ago
A formal framework to elicit roles with business meaning in RBAC systems
The role-based access control (RBAC) model has proven to be cost eļ¬€ective to reduce the complexity and costs of access permission management. To maximize the advantages oļ¬€ered...
Alessandro Colantonio, Roberto Di Pietro, Alberto ...