Sciweavers

1323 search results - page 149 / 265
» Updatable Security Views
Sort
View
135
Voted
PET
2010
Springer
15 years 6 months ago
Private Information Disclosure from Web Searches
As the amount of personal information stored at remote service providers increases, so does the danger of data theft. When connections to remote services are made in the clear and ...
Claude Castelluccia, Emiliano De Cristofaro, Danie...
116
Voted
IACR
2011
124views more  IACR 2011»
14 years 2 months ago
Efficient Multicast Key Distribution Using HOWF-based Access Control Structures
— Both broadcast encryption (BE) protocols and multicast key distribution (MKD) protocols try to solve the same problem of private group communication. For the first time, we dis...
Jing Liu, Qiong Huang, Bo Yang
191
Voted
VEE
2012
ACM
226views Virtualization» more  VEE 2012»
13 years 10 months ago
Protecting applications against TOCTTOU races by user-space caching of file metadata
Time Of Check To Time Of Use (TOCTTOU) race conditions for file accesses in user-space applications are a common problem in Unix-like systems. The mapping between filename and i...
Mathias Payer, Thomas R. Gross
128
Voted
ICLP
2007
Springer
15 years 8 months ago
Universal Timed Concurrent Constraint Programming
Abstract In this doctoral work we aim at developing a rich timed concurrent constraint (tcc) based language with strong ties to logic. The new calculus called Universal Timed Concu...
Carlos Olarte, Catuscia Palamidessi, Frank Valenci...
143
Voted
SMC
2010
IEEE
117views Control Systems» more  SMC 2010»
15 years 29 days ago
A simulation modelling approach enabling joint emergency response operations
—A novel capability for modelling and simulating intra- and inter-organizational collaboration in an emergencyresponse domain is presented. This capability combines the prescript...
Nicola Bicocchi, William Ross, Mihaela Ulieru