Sciweavers

1564 search results - page 236 / 313
» Security in Practice - Security-Usability Chasm
Sort
View
ACNS
2008
Springer
94views Cryptology» more  ACNS 2008»
15 years 10 months ago
Restricted Queries over an Encrypted Index with Applications to Regulatory Compliance
Compliance storage is an increasingly important area for businesses faced with a myriad of new document retention regulations. Today, businesses have turned to Write-One Read Many ...
Nikita Borisov, Soumyadeb Mitra
SP
2007
IEEE
105views Security Privacy» more  SP 2007»
15 years 10 months ago
Multi-Dimensional Range Query over Encrypted Data
We design an encryption scheme called Multi-dimensional Range Query over Encrypted Data (MRQED), to address the privacy concerns related to the sharing of network audit logs and v...
Elaine Shi, John Bethencourt, Hubert T.-H. Chan, D...
CRYPTO
2007
Springer
134views Cryptology» more  CRYPTO 2007»
15 years 10 months ago
Domain Extension of Public Random Functions: Beyond the Birthday Barrier
A public random function is a random function that is accessible by all parties, including the adversary. For example, a (public) random oracle is a public random function {0, 1}â...
Ueli M. Maurer, Stefano Tessaro
POLICY
2007
Springer
15 years 10 months ago
An Automated Framework for Validating Firewall Policy Enforcement
The implementation of network security devices such as ï¬rewalls and IDSs are constantly being improved to accommodate higher security and performance standards. Using reliable a...
Adel El-Atawy, Taghrid Samak, Zein Wali, Ehab Al-S...
SAC
2006
ACM
15 years 10 months ago
Privacy-preserving SVM using nonlinear kernels on horizontally partitioned data
Traditional Data Mining and Knowledge Discovery algorithms assume free access to data, either at a centralized location or in federated form. Increasingly, privacy and security co...
Hwanjo Yu, Xiaoqian Jiang, Jaideep Vaidya