Sciweavers

408 search results - page 71 / 82
» Tailoring Privacy to Users' Needs
Sort
View
CCS
2006
ACM
13 years 11 months ago
Beyond separation of duty: an algebra for specifying high-level security policies
A high-level security policy states an overall requirement for a sensitive task. One example of a high-level security policy is a separation of duty policy, which requires a sensi...
Ninghui Li, Qihua Wang
EUPROJECTS
2006
Springer
13 years 11 months ago
Web Mediators for Accessible Browsing
We present a highly accurate method for classifying web pages based on link percentage, which is the percentage of text characters that are parts of links normalized by the number...
Benjamin N. Waber, John J. Magee, Margrit Betke
CCGRID
2006
IEEE
14 years 2 months ago
gSET: Trust Management and Secure Accounting for Business in the Grid
We developed gSET as solution for the unsolved problems in the field of dynamic trust management and secure accounting in commercial virtual organizations. gSET establishes trust...
Thomas Weishäupl, Christoph Witzany, Erich Sc...
FC
2005
Springer
97views Cryptology» more  FC 2005»
14 years 1 months ago
Probabilistic Escrow of Financial Transactions with Cumulative Threshold Disclosure
Abstract. We propose a scheme for privacy-preserving escrow of financial transactions. The objective of the scheme is to preserve privacy and anonymity of the individual user enga...
Stanislaw Jarecki, Vitaly Shmatikov
AAAI
1996
13 years 9 months ago
Agent Amplified Communication
We propose an agent-based framework for assisting and simplifying person-to-person communication for information gathering tasks. As an example, we focus on locating experts for a...
Henry A. Kautz, Bart Selman, Al Milewski