Výsledky vyhľadávania - Nonnumerical Algorithms and Problems General Terms Security*
-
1
Autori:
Prispievatelia:
Predmety: Categories and Subject Descriptors D.4.6 [Operating Systems, Security and Protection—Access con- trols, K.6.5 [Management of Computing and Information Sys- tems, Security and Protection, F.2.2 [Analysis of Algorithms and Problem Complexity, Nonnumerical Algorithms and Problems General Terms Security, Algorithms Keywords Access Control, Enforcement, Bloom filter, Efficiency
Popis súboru: application/pdf
-
2
Autori: a ďalší
Prispievatelia: a ďalší
Predmety: Categories and Subject Descriptors, F.2.2 Nonnumerical Algorithms and Problems General Terms, Algorithms, Security, Theory. Keywords, differential privacy, private data analysis, privacy preserving data mining, output perturbation, sensitivity, clustering
Popis súboru: application/pdf
-
3
-
4
Autori: a ďalší
Prispievatelia: a ďalší
Predmety: Categories and Subject Descriptors, F.2.2 [ANALYSIS OF ALGORITHMS AND PROB- LEM COMPLEXITY, Nonnumerical Algorithms and Problems General Terms, Sensor Networks, Tracking, Complexity Additional Key Words and Phrases, Complexity, multiple hypotheses
Popis súboru: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.306.5958; http://www.ists.dartmouth.edu/library/351.pdf
-
5
Autori:
Prispievatelia:
Predmety: Categories and Subject Descriptors D.4.6 [Operating Systems, Security and Protection—Access controls, K.6.5 [Management of Computing and Information Systems, Security and Protection, F.2.2 [Analysis of Algorithms and Problem Complexity, Nonnumerical Algorithms and Problems—Complexity of proof procedures General Terms Security, Theory, Languages Keywords Access Control, Separation of Duty, Policy Design
Popis súboru: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.87.5374; http://www.cs.purdue.edu/homes/ninghui/papers/algebra_ccs06.pdf
-
6
Autori: a ďalší
Zdroj: Human Behavior & Emerging Technologies; 7/11/2025, Vol. 2025, p1-12, 12p
-
7
Autori: a ďalší
Prispievatelia: a ďalší
Predmety: and Protection, D.4.6 [Operating Systems, Security and Protection—Access controls, F.2.2 [Analysis of Algorithms and Problem Complexity, Nonnumerical Algorithms and Problems—Complexity of proof procedures General Terms, Security, Theory, Languages Additional Key Words and Phrases, access control, trust management, distributed system security, logic
Popis súboru: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.119.4238; http://www.cs.utsa.edu/~winsboro/index_files/Papers/Safety_JACM_AcceptedVersion.pdf
-
8
Autori: a ďalší
Prispievatelia: a ďalší
Predmety: Categories and Subject Descriptors D.4.6 [Operating Systems, Security and Protection—Access controls, K.6.5 [Management of Computing and Information Systems, Security and Protection, F.2.2 [Analysis of Algorithms and Problem Complexity, Nonnumerical Algorithms and Problems—Complexity of proof procedures General Terms Security, Theory Keywords Access Control, Fault-tolerant, Policy Design
Popis súboru: application/pdf
-
9
Autori: a ďalší
Prispievatelia: a ďalší
Predmety: Categories and Subject Descriptors D.4.6 [Operating Systems, Security and Protection—information flow controls, D.4.6 [Oper- ating Systems, Security and Protection—access controls, D.3.4 [Programming Languages, Language Classifications—constraint and logic languages, D.3 [Programming Languages, Processors— code generation, optimization, E.1 [Data, Data Structures— arrays, lists, queues, records, F.2 [Analysis of Algorithms and Problems Complexity, Nonnumerical Algorithms and Problems— computations on discrete structures, I.2.2 [Artificial Intelligence, Automatic Programming—Program transformation, E.2 [Data, Data Storage Representations—linked representations General Terms security, algorithms, languages, performance Keywords information flow, type inference, security, algorithm, time
Popis súboru: application/pdf
-
10
Autori: a ďalší
Prispievatelia: a ďalší
Predmety: Categories and Subject Descriptors, F. [Theory of Computation, F.2 [Analysis of Algorithms and Problem Complexity, F.2.2 [Nonnumerical Algorithms and Problems, Geometrical problems and computations. General Terms, Algorithms, Security, Theory. Keywords, Coresets, differential privacy, privacy
Popis súboru: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.324.1729; http://people.csail.mit.edu/dannyf/private.pdf
-
11
Autori: a ďalší
Prispievatelia: a ďalší
Predmety: Categories and Subject Descriptors D.4.6 [Operating Systems, Security and Protection—Access controls, K.6.5 [Management of Computing and Information Systems, Security and Protection, F.2.2 [Analysis of Algorithms and Problem Complexity, Nonnumerical Algorithms and Problems—Complexity of proof procedures General Terms Security, Theory Keywords role-based access control
Popis súboru: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.320.4355; http://www.cs.purdue.edu/homes/ninghui/papers/sod_ccs04.pdf
-
12
Autori: a ďalší
Prispievatelia: a ďalší
Predmety: ity, Nonnumerical Algorithms and Problems, D.4.6 [Operating Systems, Security and Protection General Terms Algorithms, Security
Popis súboru: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.584.3879; http://www.fkerschbaum.org/wpes03.pdf
-
13
Autori:
Prispievatelia:
Predmety: Categories and Subject Descriptors, E.3 [Data Encryption, Public-key Cryptosystems, F.1.3 [Computation by Abstract Devices, Complexity Measures and Classes—Complexity hierarchies, Relations among complexity classes, F.2.2 [Analysis of Algorithms and Problem Complexity, Nonnumerical Algorithms and Problems—Computations on discrete structures General Terms, Theory, Security, Algorithms Additional Key Words and Phrases, complexity theory, public-key cryptography, secret-key agreement, digital signatures, interactive proof systems, zero-knowledge protocols, one-way functions
Popis súboru: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.342.6969; http://arxiv.org/pdf/cs/0111056v2.pdf
-
14
Autori: a ďalší
Prispievatelia: a ďalší
Predmety: Categories and Subject Descriptors D.4.6 [Operating Systems, Security and Protection—Access controls, K.6.5 [Management of Computing and Information Systems, Security and Protection, F.2.2 [Analysis of Algorithms and Problem Complexity, Nonnumerical Algorithms and Problems—Complexity of proof procedures General Terms Security, Theory Keywords Access Control, Fault-tolerant, Policy Design
Popis súboru: application/pdf
-
15
Prispievatelia: The Pennsylvania State University CiteSeerX Archives
Predmety: Categories and Subject Descriptors, D.4.6 [Operating Systems, Security and Protection—Access controls, K.6.5 [Management of Computing and Information Systems, Security and Protection, F.2.2 [Analysis of Algorithms and Problem Complexity, Nonnumerical Algorithms and Problems—Complexity of proof proce- dures General Terms, Security, Theory Additional Key Words and Phrases, Access Control, Fault-tolerant, Policy Design
Popis súboru: application/pdf
-
16
Autori:
Prispievatelia:
Predmety: Categories and Subject Descriptors, D.4.6 [Operating Systems, Security and Protection—Access controls, K.6.5 [Management of Computing and Information Systems, Security and Protec- tion, F.2.2 [Analysis of Algorithms and Problem Complexity, Nonnumerical Algorithms and Problems—Complexity of proof procedures General Terms, Security, Theory Additional Key Words and Phrases, Access control, fault-tolerant, policy design ACM Reference Format
Popis súboru: application/pdf
-
17
Prispievatelia: The Pennsylvania State University CiteSeerX Archives
Predmety: lists, queues, records, F.2 [Analysis of Algorithms and Problems Complexity, Nonnumerical Algorithms and Problems— computations on discrete structures, I.2.2 [Artificial Intelligence, Automatic Programming—Program transformation General Terms security, algorithms, languages, performance Keywords access control, policy analysis, security, algorithm, time
Popis súboru: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.121.9016; http://www.cs.sunysb.edu/~katia/HriTekLiu07.pdf
-
18
Autori: a ďalší
Prispievatelia: a ďalší
Predmety: Categories and Subject Descriptors, D.4.6 [Operating Systems, Security and Protection—Access controls, K.6.5 [Management of Computing and Information Systems, Security and Protection, F.2.2 [Analysis of Algorithms and Problem Complexity, Nonnumerical Algorithms and Problems—Complexity of proof proce- dures General Terms, Security, Theory Additional Key Words and Phrases, role-based access control, separation of duty, constraints, verification, com- putational
Popis súboru: application/pdf
-
19
Autori: a ďalší
Prispievatelia: a ďalší
Predmety: Categories and Subject Descriptors, F.2 [Analysis of Algorithms and Problem Complexity, Nonnumerical Algorithms and Problems, H.2 [Database Management, Security and integrity General Terms, Algorithms, Security, Verification Additional Key Words and Phrases, Synopses, Data streams, Outsourcing ACM Transactions on Database Systems, Vol. V, No. N, Month 20YY, Pages 1–0
Popis súboru: application/pdf
-
20
Autori: a ďalší
Zdroj: ACM Transactions on Algorithms; 2006, Vol. 2 Issue 3, p435-472, 38p
Nájsť tento článok vo Web of Science
Full Text Finder