Search Results - Nonnumerical Algorithms AND Problems General Terms Security*
-
1
Authors:
Contributors:
Subject Terms: Categories and Subject Descriptors D.4.6 [Operating Systems, Security and Protection—Access con- trols, K.6.5 [Management of Computing and Information Sys- tems, Security and Protection, F.2.2 [Analysis of Algorithms and Problem Complexity, Nonnumerical Algorithms and Problems General Terms Security, Algorithms Keywords Access Control, Enforcement, Bloom filter, Efficiency
File Description: application/pdf
-
2
Authors: et al.
Contributors: et al.
Subject Terms: Categories and Subject Descriptors, F.2.2 Nonnumerical Algorithms and Problems General Terms, Algorithms, Security, Theory. Keywords, differential privacy, private data analysis, privacy preserving data mining, output perturbation, sensitivity, clustering
File Description: application/pdf
-
3
Authors:
Resource Type: eBook.
Subjects: Big data--Security measures
Categories: COMPUTERS / Security / General
PDF Full Text ePub Full Text -
4
Authors: et al.
Contributors: et al.
Subject Terms: Categories and Subject Descriptors, F.2.2 [ANALYSIS OF ALGORITHMS AND PROB- LEM COMPLEXITY, Nonnumerical Algorithms and Problems General Terms, Sensor Networks, Tracking, Complexity Additional Key Words and Phrases, Complexity, multiple hypotheses
File Description: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.306.5958; http://www.ists.dartmouth.edu/library/351.pdf
-
5
Authors:
Contributors:
Subject Terms: Categories and Subject Descriptors D.4.6 [Operating Systems, Security and Protection—Access controls, K.6.5 [Management of Computing and Information Systems, Security and Protection, F.2.2 [Analysis of Algorithms and Problem Complexity, Nonnumerical Algorithms and Problems—Complexity of proof procedures General Terms Security, Theory, Languages Keywords Access Control, Separation of Duty, Policy Design
File Description: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.87.5374; http://www.cs.purdue.edu/homes/ninghui/papers/algebra_ccs06.pdf
-
6
Authors: et al.
Source: Human Behavior & Emerging Technologies; 7/11/2025, Vol. 2025, p1-12, 12p
-
7
Authors: et al.
Contributors: et al.
Subject Terms: and Protection, D.4.6 [Operating Systems, Security and Protection—Access controls, F.2.2 [Analysis of Algorithms and Problem Complexity, Nonnumerical Algorithms and Problems—Complexity of proof procedures General Terms, Security, Theory, Languages Additional Key Words and Phrases, access control, trust management, distributed system security, logic
File Description: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.119.4238; http://www.cs.utsa.edu/~winsboro/index_files/Papers/Safety_JACM_AcceptedVersion.pdf
-
8
Authors: et al.
Contributors: et al.
Subject Terms: Categories and Subject Descriptors D.4.6 [Operating Systems, Security and Protection—Access controls, K.6.5 [Management of Computing and Information Systems, Security and Protection, F.2.2 [Analysis of Algorithms and Problem Complexity, Nonnumerical Algorithms and Problems—Complexity of proof procedures General Terms Security, Theory Keywords Access Control, Fault-tolerant, Policy Design
File Description: application/pdf
-
9
Authors: et al.
Contributors: et al.
Subject Terms: Categories and Subject Descriptors D.4.6 [Operating Systems, Security and Protection—information flow controls, D.4.6 [Oper- ating Systems, Security and Protection—access controls, D.3.4 [Programming Languages, Language Classifications—constraint and logic languages, D.3 [Programming Languages, Processors— code generation, optimization, E.1 [Data, Data Structures— arrays, lists, queues, records, F.2 [Analysis of Algorithms and Problems Complexity, Nonnumerical Algorithms and Problems— computations on discrete structures, I.2.2 [Artificial Intelligence, Automatic Programming—Program transformation, E.2 [Data, Data Storage Representations—linked representations General Terms security, algorithms, languages, performance Keywords information flow, type inference, security, algorithm, time
File Description: application/pdf
-
10
Authors: et al.
Contributors: et al.
Subject Terms: Categories and Subject Descriptors, F. [Theory of Computation, F.2 [Analysis of Algorithms and Problem Complexity, F.2.2 [Nonnumerical Algorithms and Problems, Geometrical problems and computations. General Terms, Algorithms, Security, Theory. Keywords, Coresets, differential privacy, privacy
File Description: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.324.1729; http://people.csail.mit.edu/dannyf/private.pdf
-
11
Authors: et al.
Contributors: et al.
Subject Terms: Categories and Subject Descriptors D.4.6 [Operating Systems, Security and Protection—Access controls, K.6.5 [Management of Computing and Information Systems, Security and Protection, F.2.2 [Analysis of Algorithms and Problem Complexity, Nonnumerical Algorithms and Problems—Complexity of proof procedures General Terms Security, Theory Keywords role-based access control
File Description: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.320.4355; http://www.cs.purdue.edu/homes/ninghui/papers/sod_ccs04.pdf
-
12
Authors: et al.
Contributors: et al.
Subject Terms: ity, Nonnumerical Algorithms and Problems, D.4.6 [Operating Systems, Security and Protection General Terms Algorithms, Security
File Description: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.584.3879; http://www.fkerschbaum.org/wpes03.pdf
-
13
Authors:
Contributors:
Subject Terms: Categories and Subject Descriptors, E.3 [Data Encryption, Public-key Cryptosystems, F.1.3 [Computation by Abstract Devices, Complexity Measures and Classes—Complexity hierarchies, Relations among complexity classes, F.2.2 [Analysis of Algorithms and Problem Complexity, Nonnumerical Algorithms and Problems—Computations on discrete structures General Terms, Theory, Security, Algorithms Additional Key Words and Phrases, complexity theory, public-key cryptography, secret-key agreement, digital signatures, interactive proof systems, zero-knowledge protocols, one-way functions
File Description: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.342.6969; http://arxiv.org/pdf/cs/0111056v2.pdf
-
14
Authors: et al.
Contributors: et al.
Subject Terms: Categories and Subject Descriptors D.4.6 [Operating Systems, Security and Protection—Access controls, K.6.5 [Management of Computing and Information Systems, Security and Protection, F.2.2 [Analysis of Algorithms and Problem Complexity, Nonnumerical Algorithms and Problems—Complexity of proof procedures General Terms Security, Theory Keywords Access Control, Fault-tolerant, Policy Design
File Description: application/pdf
-
15
Contributors: The Pennsylvania State University CiteSeerX Archives
Subject Terms: Categories and Subject Descriptors, D.4.6 [Operating Systems, Security and Protection—Access controls, K.6.5 [Management of Computing and Information Systems, Security and Protection, F.2.2 [Analysis of Algorithms and Problem Complexity, Nonnumerical Algorithms and Problems—Complexity of proof proce- dures General Terms, Security, Theory Additional Key Words and Phrases, Access Control, Fault-tolerant, Policy Design
File Description: application/pdf
-
16
Authors:
Contributors:
Subject Terms: Categories and Subject Descriptors, D.4.6 [Operating Systems, Security and Protection—Access controls, K.6.5 [Management of Computing and Information Systems, Security and Protec- tion, F.2.2 [Analysis of Algorithms and Problem Complexity, Nonnumerical Algorithms and Problems—Complexity of proof procedures General Terms, Security, Theory Additional Key Words and Phrases, Access control, fault-tolerant, policy design ACM Reference Format
File Description: application/pdf
-
17
Contributors: The Pennsylvania State University CiteSeerX Archives
Subject Terms: lists, queues, records, F.2 [Analysis of Algorithms and Problems Complexity, Nonnumerical Algorithms and Problems— computations on discrete structures, I.2.2 [Artificial Intelligence, Automatic Programming—Program transformation General Terms security, algorithms, languages, performance Keywords access control, policy analysis, security, algorithm, time
File Description: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.121.9016; http://www.cs.sunysb.edu/~katia/HriTekLiu07.pdf
-
18
Authors: et al.
Contributors: et al.
Subject Terms: Categories and Subject Descriptors, D.4.6 [Operating Systems, Security and Protection—Access controls, K.6.5 [Management of Computing and Information Systems, Security and Protection, F.2.2 [Analysis of Algorithms and Problem Complexity, Nonnumerical Algorithms and Problems—Complexity of proof proce- dures General Terms, Security, Theory Additional Key Words and Phrases, role-based access control, separation of duty, constraints, verification, com- putational
File Description: application/pdf
-
19
Authors: et al.
Contributors: et al.
Subject Terms: Categories and Subject Descriptors, F.2 [Analysis of Algorithms and Problem Complexity, Nonnumerical Algorithms and Problems, H.2 [Database Management, Security and integrity General Terms, Algorithms, Security, Verification Additional Key Words and Phrases, Synopses, Data streams, Outsourcing ACM Transactions on Database Systems, Vol. V, No. N, Month 20YY, Pages 1–0
File Description: application/pdf
-
20
Authors: et al.
Source: ACM Transactions on Algorithms; 2006, Vol. 2 Issue 3, p435-472, 38p
Subject Terms: ALGORITHMS, MATHEMATICAL analysis, APPROXIMATION theory, FUNCTIONAL analysis, MATHEMATICS, ALGEBRA
Nájsť tento článok vo Web of Science
Full Text Finder