Aura231 发表于 2025-3-30 11:47:41

http://reply.papertrans.cn/27/2633/263227/263227_51.png

Additive 发表于 2025-3-30 14:46:34

http://reply.papertrans.cn/27/2633/263227/263227_52.png

虚构的东西 发表于 2025-3-30 19:14:19

Secure Outsourcing of DNA Searching via Finite Automatalem already exist, but can be a burden on the participants. Thus, we propose techniques for secure outsourcing of finite automata evaluation to computational servers, which do not learn any information. Our techniques are applicable to any type of finite automata, but the optimizations are tailored to DNA searching.

易弯曲 发表于 2025-3-30 22:43:28

Query: SPARQL Query Rewriting to Enforce Data Confidentialitynfidentiality policy as a set of positive and negative filters (corresponding respectively to permissions and prohibitions) that apply to SPARQL queries. We then define rewriting algorithms that transform the queries so that the results returned by transformed queries are compliant with the confidentiality policy.

INCUR 发表于 2025-3-31 03:23:52

http://reply.papertrans.cn/27/2633/263227/263227_55.png

malign 发表于 2025-3-31 05:13:08

http://reply.papertrans.cn/27/2633/263227/263227_56.png

拥护 发表于 2025-3-31 11:37:34

http://reply.papertrans.cn/27/2633/263227/263227_57.png

fatty-acids 发表于 2025-3-31 16:55:40

http://reply.papertrans.cn/27/2633/263227/263227_58.png

Petechiae 发表于 2025-3-31 20:13:05

https://doi.org/10.1007/978-3-662-68313-2compromise the peers, the decryption keys are decomposed into pieces scattered amongst peers. We discuss the details of how to adapt distributed encryption schemes to PDMS to enforce robust and resilient access control, and demonstrate the efficiency and scalability of our approach by means of an extensive experimental study.

Inelasticity 发表于 2025-4-1 00:19:05

Distributed and Secure Access Control in P2P Databasescompromise the peers, the decryption keys are decomposed into pieces scattered amongst peers. We discuss the details of how to adapt distributed encryption schemes to PDMS to enforce robust and resilient access control, and demonstrate the efficiency and scalability of our approach by means of an extensive experimental study.
页: 1 2 3 4 5 [6] 7
查看完整版本: Titlebook: Data and Applications Security and Privacy XXIV; 24th Annual IFIP WG Sara Foresti,Sushil Jajodia Conference proceedings 2010 IFIP Internat