Sciweavers

1103 search results - page 210 / 221
» Semantic Interoperability of Authorizations
Sort
View
CANS
2010
Springer
150views Cryptology» more  CANS 2010»
13 years 6 months ago
Predicate Encryption with Partial Public Keys
Abstract. Predicate encryption is a new powerful cryptographic primitive which allows for fine-grained access control for encrypted data: the owner of the secret key can release pa...
Carlo Blundo, Vincenzo Iovino, Giuseppe Persiano
CHI
2011
ACM
13 years 5 days ago
Surfpad: riding towards targets on a squeeze film effect
We present Surfpad, a pointing facilitation technique that does not decrease target distance or increase target width in either control or display space. This new technique operat...
Géry Casiez, Nicolas Roussel, Romuald Vanbe...
KDD
2012
ACM
247views Data Mining» more  KDD 2012»
11 years 11 months ago
Integrating meta-path selection with user-guided object clustering in heterogeneous information networks
Real-world, multiple-typed objects are often interconnected, forming heterogeneous information networks. A major challenge for link-based clustering in such networks is its potent...
Yizhou Sun, Brandon Norick, Jiawei Han, Xifeng Yan...
ESORICS
2009
Springer
14 years 9 months ago
Dynamic Enforcement of Abstract Separation of Duty Constraints
Separation of Duty Constraints David Basin1 , Samuel J. Burri1,2 , and G?unter Karjoth2 1 ETH Zurich, Department of Computer Science, Switzerland 2 IBM Research, Zurich Research La...
David A. Basin, Günter Karjoth, Samuel J. Bur...
KDD
2009
ACM
206views Data Mining» more  KDD 2009»
14 years 9 months ago
Ranking-based clustering of heterogeneous information networks with star network schema
A heterogeneous information network is an information network composed of multiple types of objects. Clustering on such a network may lead to better understanding of both hidden s...
Yizhou Sun, Yintao Yu, Jiawei Han