Sciweavers

738 search results - page 89 / 148
» Privacy Protection for Speech Information
Sort
View
CCS
2005
ACM
14 years 2 months ago
Formal security analysis of basic network-attached storage
We study formal security properties of network-attached storage (NAS) in an applied pi calculus. We model NAS as an implementation of a specification based on traditional central...
Avik Chaudhuri, Martín Abadi
AUSDM
2006
Springer
157views Data Mining» more  AUSDM 2006»
14 years 24 days ago
Safely Delegating Data Mining Tasks
Data mining is playing an important role in decision making for business activities and governmental administration. Since many organizations or their divisions do not possess the...
Ling Qiu, Kok-Leong Ong, Siu Man Lui
ACSAC
2000
IEEE
14 years 21 days ago
Dynamic Access Control through Petri Net Workflows
Access control is an important protection mechanism for information systems. An access control matrix grants subjects privileges to objects. Today, access control matrices are sta...
Konstantin Knorr
AMW
2011
13 years 20 days ago
Private Database Synthesis for Outsourced System Evaluation
The goal of this paper is to permit secure outsourced system evaluation. We propose a method for generating synthetic databases and obfuscating a workload of queries in order to pr...
Vani Gupta, Gerome Miklau, Neoklis Polyzotis
IDTRUST
2010
ACM
14 years 3 months ago
Practical and secure trust anchor management and usage
Public Key Infrastructure (PKI) security depends upon secure management and usage of trust anchors. Unfortunately, widely used mechanisms, management models and usage practices re...
Carl Wallace, Geoff Beier