Sciweavers

320 search results - page 39 / 64
» Securing history: Privacy and accountability in database sys...
Sort
View
SIGMOD
2012
ACM
223views Database» more  SIGMOD 2012»
11 years 10 months ago
MaskIt: privately releasing user context streams for personalized mobile applications
The rise of smartphones equipped with various sensors has enabled personalization of various applications based on user contexts extracted from sensor readings. At the same time i...
Michaela Götz, Suman Nath, Johannes Gehrke
DASFAA
2009
IEEE
193views Database» more  DASFAA 2009»
13 years 11 months ago
Encryption over Semi-trusted Database
—Database security has become a vital issue in modern Web applications. Critical business data in databases is an evident target for attack. Therefore, ensuring the confidentiali...
Hasan Kadhem, Toshiyuki Amagasa, Hiroyuki Kitagawa
ESORICS
2009
Springer
14 years 2 months ago
A Quantitative Analysis of Indistinguishability for a Continuous Domain Biometric Cryptosystem
Abstract. Biometric information is regarded as highly sensitive information and therefore encryption techniques for biometric information are needed to address security and privacy...
Ileana Buhan, Jeroen Breebaart, Jorge Guajardo, Ko...
OOPSLA
1992
Springer
13 years 11 months ago
CACL: Efficient Fine-Grained Protection for Objects
CACL is a protection scheme for objects that offers a simple and flexible model of protection and has an efficient, software-only implementation. The model, based on Access Contro...
Joel E. Richardson, Peter M. Schwarz, Luis-Felipe ...
AINA
2009
IEEE
14 years 25 days ago
Location-Aware Authentication and Access Control
—The paper first discusses motivations why taking into account location information in authentication and access control is important. The paper then surveys current approaches t...
Elisa Bertino, Michael S. Kirkpatrick