Sciweavers

344 search results - page 45 / 69
» trust 2009
Sort
View
ICTAI
2009
IEEE
13 years 6 months ago
A Knowledge-Light Nonlinear Case-Based Reasoning Approach to Radiotherapy Planning
Radiation is often used in prostate cancer treatments. Radiotherapy treatment planning is a complex decision making process. In order to make a patient well, the oncologist has to...
Nishikant Mishra, Sanja Petrovic, Santhanam Sundar
PERCOM
2009
ACM
14 years 3 months ago
A Distributed k-Anonymity Protocol for Location Privacy
To benefit from a location-based service, a person must reveal her location to the service. However, knowing the person’s location might allow the service to re-identify the pe...
Ge Zhong, Urs Hengartner
CCS
2009
ACM
14 years 3 months ago
Secure in-VM monitoring using hardware virtualization
Kernel-level attacks or rootkits can compromise the security of an operating system by executing with the privilege of the kernel. Current approaches use virtualization to gain hi...
Monirul I. Sharif, Wenke Lee, Weidong Cui, Andrea ...
ICTAI
2009
IEEE
14 years 3 months ago
Managing Authorization Provenance: A Modal Logic Based Approach
Abstract—In distributed environments, access control decisions depend on statements of multiple agents rather than only one central trusted party. However, existing policy langua...
Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu
SSS
2009
Springer
195views Control Systems» more  SSS 2009»
14 years 3 months ago
Anonymous Transactions in Computer Networks
Abstract. We present schemes for providing anonymous transactions while privacy and anonymity are preserved, providing user anonymous authentication in distributed networks such as...
Shlomi Dolev, Marina Kopeetsky