Sciweavers

6555 search results - page 1219 / 1311
» Secure attribute-based systems
Sort
View
ACNS
2010
Springer
156views Cryptology» more  ACNS 2010»
14 years 3 months ago
COP: A Step toward Children Online Privacy
We propose COP, a client-side system for protecting children’s online privacy and empowering parental control over children’s information disclosure with little manual effort. ...
Wei Xu, Sencun Zhu, Heng Xu
PODS
1999
ACM
95views Database» more  PODS 1999»
14 years 3 months ago
Minimal Data Upgrading to Prevent Inference and Association
Despite advances in recent years in the area of mandatory access control in database systems, today's information repositories remain vulnerable to inference and data associa...
Steven Dawson, Sabrina De Capitani di Vimercati, P...
ICEIS
1999
IEEE
14 years 3 months ago
A New Method to Block Access to Illegal and Harmful Content on the Internet
: Filtering software is the most commonly used to protect children and young people from illegal and harmful contents on the Internet. Most of this software blocks access to Intern...
Byung-Jeon Yoo, Hyun-Gyoo Yook, Myong-Soon Park
EUROCRYPT
1999
Springer
14 years 3 months ago
Conditional Oblivious Transfer and Timed-Release Encryption
Abstract. We consider the problem of sending messages into the future." Previous constructions for this task were either based on heuristic assumptions or did not provide anon...
Giovanni Di Crescenzo, Rafail Ostrovsky, Sivaramak...
ICSE
1999
IEEE-ACM
14 years 3 months ago
A Practical Method for Verifying Event-Driven Software
Formal verification methods are used only sparingly in software development. The most successful methods to date are based on the use of model checking tools. To use such he user ...
Gerard J. Holzmann, Margaret H. Smith
« Prev « First page 1219 / 1311 Last » Next »