Sciweavers

382 search results - page 62 / 77
» k-Anonymity: A Model for Protecting Privacy
Sort
View
JCS
2008
88views more  JCS 2008»
13 years 7 months ago
A privacy-aware access control system
The protection of privacy is an increasing concern in our networked society because of the growing amount of personal information that is being collected by a number of commercial...
Claudio Agostino Ardagna, Marco Cremonini, Sabrina...
JUCS
2006
102views more  JUCS 2006»
13 years 7 months ago
A Mechanism for Solving Conflicts in Ambient Intelligent Environments
: Ambient Intelligence scenarios describe situations in which multitude of devices and agents live together. In this kind ofscenarios is frequent to see the appearance ofconflicts ...
Pablo A. Haya, Germán Montoro, Abraham Esqu...
CCS
2009
ACM
14 years 8 months ago
A generic construction of useful client puzzles
Denial of Service (DoS) attacks are serious threats for network societies. For dealing with DoS attacks, Jakobsson and Juels first proposed the notion of useful client puzzles (UC...
Rui Zhang 0002, Goichiro Hanaoka, Hideki Imai
ACSAC
2009
IEEE
14 years 2 months ago
SecureMR: A Service Integrity Assurance Framework for MapReduce
—MapReduce has become increasingly popular as a powerful parallel data processing model. To deploy MapReduce as a data processing service over open systems such as service orient...
Wei Wei, Juan Du, Ting Yu, Xiaohui Gu
CCS
2009
ACM
14 years 2 months ago
A probabilistic approach to hybrid role mining
Role mining algorithms address an important access control problem: configuring a role-based access control system. Given a direct assignment of users to permissions, role mining...
Mario Frank, Andreas P. Streich, David A. Basin, J...