Sciweavers

977 search results - page 95 / 196
» Secure Computation with Fixed-Point Numbers
Sort
View
SWS
2004
ACM
14 years 2 months ago
Applying hierarchical and role-based access control to XML documents
W3C Recommendations XML Encryption and XML-Digital Signature can be used to protect the confidentiality of and provide assurances about the integrity of XML documents transmitted...
Jason Crampton
CCS
2004
ACM
14 years 2 months ago
Parallel mixing
Efforts to design faster synchronous mix networks have focused on reducing the computational cost of mixing per server. We propose a different approach: our re-encryption mixnet...
Philippe Golle, Ari Juels
ESORICS
2009
Springer
14 years 9 months ago
Set Covering Problems in Role-Based Access Control
Abstract. Interest in role-based access control has generated considerable research activity in recent years. A number of interesting problems related to the well known set cover p...
Liang Chen, Jason Crampton
ICARCV
2006
IEEE
230views Robotics» more  ICARCV 2006»
14 years 3 months ago
A Biometric Approach to Linux Login Access Control
— Login access control refers to securing the entry point to a computing system. The login system is responsible for this service and must provide a number of tasks, the main tas...
Adam J. Gandossi, Wanquan Liu, Ronny Tjahyadi
IVEVA
2004
13 years 10 months ago
Giving Embodied Agents a Grid-Boost
Grid technology has been widely used for large-scale computational problems, but it also provides a framework for running a big number of smallsized processes. Moreover, these proc...
José A. Pérez, Carlos Delgado-Mata, ...