Sciweavers

258 search results - page 46 / 52
» Securing Provenance
Sort
View
EDBT
2006
ACM
181views Database» more  EDBT 2006»
14 years 10 months ago
TeNDaX, a Collaborative Database-Based Real-Time Editor System
TeNDaX is a collaborative database-based real-time editor system. TeNDaX is a new approach for word-processing in which documents (i.e. content and structure, tables, images etc.) ...
Klaus R. Dittrich, Michael H. Böhlen, Stefani...
TCC
2007
Springer
102views Cryptology» more  TCC 2007»
14 years 4 months ago
Perfect NIZK with Adaptive Soundness
Abstract. This paper presents a very simple and efficient adaptivelysound perfect NIZK argument system for any NP-language. In contrast to recently proposed schemes by Groth, Ostro...
Masayuki Abe, Serge Fehr
SACMAT
2005
ACM
14 years 3 months ago
Role mining with ORCA
With continuously growing numbers of applications, enterprises face the problem of efficiently managing the assignment of access permissions to their users. On the one hand, secur...
Jürgen Schlegelmilch, Ulrike Steffens
PDCAT
2004
Springer
14 years 3 months ago
GridCrypt: High Performance Symmetric Key Cryptography Using Enterprise Grids
Today’s cryptanalysis on symmetric key cryptography is encouraging the use of larger key sizes and complex algorithms to achieve an unbreakable state. However, this leads an inc...
Agus Setiawan, David Adiutama, Julius Liman, Aksha...
WPES
2003
ACM
14 years 3 months ago
Covert channels and anonymizing networks
There have long been threads of investigation into covert channels, and threads of investigation into anonymity, but these two closely related areas of information hiding have not...
Ira S. Moskowitz, Richard E. Newman, Daniel P. Cre...