Sciweavers

1288 search results - page 90 / 258
» Securing aspect composition
Sort
View
ACSAC
2003
IEEE
14 years 3 months ago
Protecting Personal Data: Can IT Security Management Standards Help?
Compelled to improve information security by the introduction of personal data protection legislation, organizations worldwide are adopting standardized security management guidel...
Giovanni Iachello
ESORICS
2008
Springer
14 years 1 days ago
On the Security of Delegation in Access Control Systems
Delegation is a mechanism that allows a user A to act on another user B's behalf by making B's access rights available to A. It is well recognized as an important mechani...
Qihua Wang, Ninghui Li, Hong Chen
JNW
2008
112views more  JNW 2008»
13 years 10 months ago
A Conceptual Model for Analysis and Design of Tunable Security Services
Security is an increasingly important issue for networked services. However, since networked environments may exhibit varying networking behavior and contain heterogeneous devices ...
Stefan Lindskog, Zoltán Faigl, Anna Brunstr...
STOC
2009
ACM
145views Algorithms» more  STOC 2009»
14 years 11 months ago
Differential privacy and robust statistics
We show by means of several examples that robust statistical estimators present an excellent starting point for differentially private estimators. Our algorithms use a new paradig...
Cynthia Dwork, Jing Lei
CRYPTO
1990
Springer
79views Cryptology» more  CRYPTO 1990»
14 years 2 months ago
Fair Computation of General Functions in Presence of Immoral Majority
This paper describes a method for n players, a majority of which may be faulty, to compute correctly, privately, and fairly any computable function f(Xl, ...,x,) where xi is the i...
Shafi Goldwasser, Leonid A. Levin