Sciweavers

1120 search results - page 16 / 224
» Securely sharing neuroimagery
Sort
View
CANS
2008
Springer
111views Cryptology» more  CANS 2008»
13 years 11 months ago
Analysis and Design of Multiple Threshold Changeable Secret Sharing Schemes
In a (r, n)-threshold secret sharing scheme, no group of (r - 1) colluding members can recover the secret value s. However, the number of colluders is likely to increase over time...
Tiancheng Lou, Christophe Tartary
DBSEC
2007
106views Database» more  DBSEC 2007»
13 years 11 months ago
Enforcing Honesty in Assured Information Sharing Within a Distributed System
The growing number of distributed information systems such as the internet has created a need for security in data sharing. When several autonomous parties attempt to share data, t...
Ryan Layfield, Murat Kantarcioglu, Bhavani M. Thur...
ICWSM
2008
13 years 11 months ago
Social Access Control for Social Media Using Shared Knowledge Questions
Managing privacy of online content is difficult. We present a simple social access control where sharers specify test questions of shared knowledge, such as "what is our scho...
Michael Toomim, Xianhang Zhang, James Fogarty, Nat...
FLAIRS
2004
13 years 11 months ago
Finding Partners to Form Information Sharing Networks in Open Multi-Agent Systems
Information quality assurance despite the existence of uncertainty about sources can be investigated in the context of soft security where an agent maintains trustworthiness evalu...
K. Suzanne Barber, Jisun Park
DBSEC
2011
233views Database» more  DBSEC 2011»
13 years 1 months ago
Multiparty Authorization Framework for Data Sharing in Online Social Networks
Online social networks (OSNs) have experienced tremendous growth in recent years and become a de facto portal for hundreds of millions of Internet users. These OSNs offer attractiv...
Hongxin Hu, Gail-Joon Ahn