Sciweavers

207 search results - page 18 / 42
» Predicate Privacy in Encryption Systems
Sort
View
SDMW
2005
Springer
14 years 26 days ago
Metadata Management in Outsourced Encrypted Databases
Abstract. Database outsourcing is becoming increasingly popular introducing a new paradigm, called database-as-a-service, where a client’s database is stored at an external servi...
Ernesto Damiani, Sabrina De Capitani di Vimercati,...
VLDB
2007
ACM
187views Database» more  VLDB 2007»
14 years 7 months ago
Secure Data Outsourcing
The networked and increasingly ubiquitous nature of today's data management services mandates assurances to detect and deter malicious or faulty behavior. This is particularly...
Radu Sion
CCS
2007
ACM
14 years 1 months ago
Split-ballot voting: everlasting privacy with distributed trust
In this paper we propose a new voting protocol with desirable security properties. The voting stage of the protocol can be performed by humans without computers; it provides every...
Tal Moran, Moni Naor
CSFW
2003
IEEE
14 years 20 days ago
Type-Based Distributed Access Control
A type system is presented that combines a weak form of information flow control, termed distributed access control in the paper, with typed cryptographic operations. The motivat...
Tom Chothia, Dominic Duggan, Jan Vitek
CSREAPSC
2006
13 years 8 months ago
A Policy-Based Location Identification Architecture for Pervasive Systems
In this paper, we present a policy-based architecture to be used in identifying the location of users within a pervasive system environment. Mobile users can define their own poli...
Sherif G. Aly