Dynamic and efficient key management for access hierarchies

MJ Atallah, M Blanton, N Fazio, KB Frikken - ACM Transactions on …, 2009 - dl.acm.org
Hierarchies arise in the context of access control whenever the user population can be
modeled as a set of partially ordered classes (represented as a directed graph). A user with …

[PDF][PDF] Schema-free xquery

Y Li, C Yu, HV Jagadish - … of the Thirtieth international conference on Very …, 2004 - vldb.org
The widespread adoption of XML holds out the promise that document structure can be
exploited to specify precise database queries. However, the user may have only a limited …

Scalable hierarchical access control in secure group communications

Y Sun, KJR Liu - IEEE INFOCOM 2004, 2004 - ieeexplore.ieee.org
Many group communications require a security infrastructure that ensures multiple levels of
access privilege for group members. Access control in hierarchy is prevalent in multimedia …

On key assignment for hierarchical access control

J Crampton, K Martin, P Wild - 19th IEEE Computer Security …, 2006 - ieeexplore.ieee.org
A key assignment scheme is a cryptographic technique for implementing an information flow
policy, sometimes known as hierarchical access control. All the research to date on key …

Segmentation of visual motion by minimizing convex non-quadratic functionals

C Schnorr - Proceedings of 12th International Conference on …, 1994 - ieeexplore.ieee.org
A minimization problem is proposed to combine smoothing of locally computed motion data
(eg normal flow) with the detection of motion boundaries. The continuous formulation of the …

Data structure, method, and system for predicting medical conditions

F Gotthardt - US Patent 8,868,436, 2014 - Google Patents
4,864,616 A 9, 1989 Pond et al. 4,879,747 A 11/1989 Leighton et al. 5,210,795 A 5/1993
Lipner et al. 5,721,781 A 2f1998 Deo et al. 5,754,675 A 5/1998 Valadier 5,832,091 A …

Client-based access control management for xml

L Bouganim, FD Ngoc, P Pucheral - … of the Very Large Data Bases, 2004 - books.google.com
The erosion of trust put in traditional database servers and in Database Service Providers,
the growing interest for different forms of data dissemination and the concern for protecting …

[KNYGA][B] Preserving privacy in data outsourcing

S Foresti - 2010 - books.google.com
Foreword by Pierangela Samarati Privacy requirements have an increasing impact on the
realization of modern applications. Commercial and legal regulations demand that privacy …

Exploiting hierarchical identity-based encryption for access control to pervasive computing information

U Hengartner, P Steenkiste - … and Privacy for Emerging Areas in …, 2005 - ieeexplore.ieee.org
Access control to confidential information in pervasive computing environments is
challenging for multiple reasons: First, a client requesting access might not know which …

Key management for content access control in a hierarchy

HR Hassen, A Bouabdallah, H Bettahar, Y Challal - Computer Networks, 2007 - Elsevier
The need for content access control in hierarchies (CACH) appears naturally in all contexts
where a set of users have different access rights to a set of resources. The hierarchy is …