Sciweavers

2272 search results - page 302 / 455
» Provable Data Privacy
Sort
View
STORAGESS
2006
ACM
14 years 3 months ago
Access control for a replica management database
Distributed computation systems have become an important tool for scientific simulation, and a similarly distributed replica management system may be employed to increase the loc...
Justin M. Wozniak, Paul Brenner, Douglas Thain
ACISP
2005
Springer
14 years 3 months ago
Cryptanalysis of Two Variants of PCBC Mode When Used for Message Integrity
Abstract. The PCBC block cipher mode of operation has many variants, of which one, due to Meyer and Matyas, dates back over 20 years. Whilst a particularly simple variant of PCBC h...
Chris J. Mitchell
ESORICS
2004
Springer
14 years 3 months ago
Portable and Flexible Document Access Control Mechanisms
We present and analyze portable access control mechanisms for large data repositories, in that the customized access policies are stored on a portable device (e.g., a smart card). ...
Mikhail J. Atallah, Marina Bykova
ACSAC
2003
IEEE
14 years 3 months ago
An Intrusion-Tolerant Password Authentication System
In a password-based authentication system, to authenticate a user, a server typically stores password verification data (PVD), which is a value derived from the user’s password...
Xunhua Wang, Mohammad Hossain Heydari, Hua Lin
SP
2003
IEEE
104views Security Privacy» more  SP 2003»
14 years 3 months ago
Using Replication and Partitioning to Build Secure Distributed Systems
A challenging unsolved security problem is how to specify and enforce system-wide security policies; this problem is even more acute in distributed systems with mutual distrust. T...
Lantian Zheng, Stephen Chong, Andrew C. Myers, Ste...