Sciweavers

1323 search results - page 79 / 265
» Updatable Security Views
Sort
View
NDSS
2000
IEEE
14 years 2 months ago
Secure Virtual Enclaves: Supporting Coalition Use of Distributed Application Technologies
The Secure Virtual Enclaves (SVE) collaboration infrastructure allows multiple organizations to share their distributed application objects, while respecting organizational autono...
Deborah Shands, Richard Yee, Jay Jacobs, E. John S...
DBA
2004
88views Database» more  DBA 2004»
13 years 11 months ago
A Flexible Database Authorization System
In this paper we present an authorization mechanism for a relational database. It allows defining the user privileges exact to a table row. To implement that we used the INSTEAD t...
Bazyli Blicharski, Krzysztof Stencel
CTRSA
2009
Springer
127views Cryptology» more  CTRSA 2009»
14 years 4 months ago
Adaptive-ID Secure Revocable Identity-Based Encryption
Abstract. Identity-Based Encryption (IBE) offers an interesting alternative to PKI-enabled encryption as it eliminates the need for digital certificates. While revocation has bee...
Benoît Libert, Damien Vergnaud
CSFW
2008
IEEE
14 years 4 months ago
A Trust Management Approach for Flexible Policy Management in Security-Typed Languages
Early work on security-typed languages required that legal information flows be defined statically. More recently, techniques have been introduced that relax these assumptions a...
Sruthi Bandhakavi, William H. Winsborough, Mariann...
GLOBECOM
2008
IEEE
14 years 4 months ago
Towards Secure Link Quality Measurement in Multihop Wireless Networks
Abstract— Link quality measurement (LQM), i.e. packet reception ratio (PRR) measurement, is becoming an indispensable component in multihop wireless networks. However, in all the...
Kai Zeng, Shucheng Yu, Kui Ren, Wenjing Lou, Yanch...