Sciweavers

316 search results - page 41 / 64
» Where do security policies come from
Sort
View
ACISICIS
2007
IEEE
14 years 1 months ago
Trust Realisation in Multi-domain Collaborative Environments
In the Internet-age, the geographical boundaries that have previously impinged upon inter-organisational collaborations have become decreasingly important. Of more importance for ...
Oluwafemi Ajayi, Richard O. Sinnott, Anthony Stell
ESORICS
2009
Springer
14 years 8 months ago
Dynamic Enforcement of Abstract Separation of Duty Constraints
Separation of Duty Constraints David Basin1 , Samuel J. Burri1,2 , and G?unter Karjoth2 1 ETH Zurich, Department of Computer Science, Switzerland 2 IBM Research, Zurich Research La...
David A. Basin, Günter Karjoth, Samuel J. Bur...
ISAAC
2010
Springer
276views Algorithms» more  ISAAC 2010»
13 years 5 months ago
Anonymous Fuzzy Identity-Based Encryption for Similarity Search
Abstract. In this paper, we consider the problem of predicate encryption and focus on the predicate for testing whether the hamming distance between the attribute X of a data item ...
David W. Cheung, Nikos Mamoulis, W. K. Wong, Siu-M...
ICBA
2004
Springer
143views Biometrics» more  ICBA 2004»
14 years 27 days ago
Externalized Fingerprint Matching
The 9/11 tragedy triggered an increased interest in biometric passports. According to several sources [2], the electronic ID market is expected to increase by more than 50% per ann...
Claude Barral, Jean-Sébastien Coron, David ...
SPW
2000
Springer
13 years 11 months ago
The Resurrecting Duckling - What Next?
In the context of the security of wireless ad hoc networks, we previously explored the problem of secure transient association between a master and a slave device in the absence of...
Frank Stajano