Sciweavers

579 search results - page 51 / 116
» Security Enforcement Model for Distributed Usage Control
Sort
View
PROVSEC
2009
Springer
14 years 2 months ago
Self-enforcing Private Inference Control
Private inference control enables simultaneous enforcement of inference control and protection of users’ query privacy. Private inference control is a useful tool for database ap...
Yanjiang Yang, Yingjiu Li, Jian Weng, Jianying Zho...
EDO
2005
Springer
14 years 1 months ago
Optimizing layered middleware
Middleware is often built using a layered architectural style. Layered design provides good separation of the different concerns of middleware, such as communication, marshaling, ...
Ömer Erdem Demir, Premkumar T. Devanbu, Eric ...
SP
2007
IEEE
183views Security Privacy» more  SP 2007»
14 years 2 months ago
Ciphertext-Policy Attribute-Based Encryption
In several distributed systems a user should only be able to access data if a user posses a certain set of credentials or attributes. Currently, the only method for enforcing such...
John Bethencourt, Amit Sahai, Brent Waters
KES
2005
Springer
14 years 1 months ago
A Preliminary Design for a Privacy-Friendly Free P2P Media File Distribution System
In most P2P business models, in which users purchase the media, it is necessary to securely identify the user in order to facilitate payment. In this paper, we present a technique ...
Ron G. van Schyndel
ICDCS
2008
IEEE
14 years 2 months ago
A Sophisticated Privacy-Enhanced Yet Accountable Security Framework for Metropolitan Wireless Mesh Networks
— Recently, multi-hop wireless mesh networks (WMNs) have attracted increasing attention and deployment as a low-cost approach to provide broadband Internet access at metropolitan...
Kui Ren, Wenjing Lou