Sciweavers

186 search results - page 13 / 38
» Secure Association Rule Sharing
Sort
View
FSKD
2005
Springer
90views Fuzzy Logic» more  FSKD 2005»
14 years 28 days ago
Direct Candidates Generation: A Novel Algorithm for Discovering Complete Share-Frequent Itemsets
The value of the itemset share is one way of evaluating the magnitude of an itemset. From business perspective, itemset share values reflect more the significance of itemsets for m...
Yu-Chiang Li, Jieh-Shan Yeh, Chin-Chen Chang
DEXAW
2002
IEEE
132views Database» more  DEXAW 2002»
14 years 11 days ago
A Disciplined Approach for the Integration of Heterogeneous XML Datasources
In this paper, we focus on the problem of integrating heterogeneous XML datasources. We follow a semantic approach to information sharing and integration, and we present a discipl...
Silvana Castano, Alfio Ferrara, G. S. Kuruvilla Ot...
MOBISYS
2011
ACM
12 years 10 months ago
ProxiMate: proximity-based secure pairing using ambient wireless signals
Forming secure associations between wireless devices that do not share a prior trust relationship is an important problem. This paper presents ProxiMate, a system that allows wire...
Suhas Mathur, Robert C. Miller, Alexander Varshavs...
CCS
2007
ACM
14 years 1 months ago
Provably secure ciphertext policy ABE
In ciphertext policy attribute-based encryption (CP-ABE), every secret key is associated with a set of attributes, and every ciphertext is associated with an access structure on a...
Ling Cheung, Calvin C. Newport
CADE
2002
Springer
14 years 7 months ago
A Gradual Approach to a More Trustworthy, Yet Scalable, Proof-Carrying Code
Abstract. Proof-carrying code (PCC) allows a code producer to associate to a program a machine-checkable proof of its safety. In the original approach to PCC, the safety policy inc...
Robert R. Schneck, George C. Necula