Suchergebnisse - Nonnumerical Algorithms and Problems General Terms Security~
-
1
Autoren:
Weitere Verfasser:
Schlagwörter: Categories and Subject Descriptors D.4.6 [Operating Systems, Security and Protection—Access con- trols, K.6.5 [Management of Computing and Information Sys- tems, Security and Protection, F.2.2 [Analysis of Algorithms and Problem Complexity, Nonnumerical Algorithms and Problems General Terms Security, Algorithms Keywords Access Control, Enforcement, Bloom filter, Efficiency
Dateibeschreibung: application/pdf
-
2
Autoren:
Weitere Verfasser:
Schlagwörter: Categories and Subject Descriptors D.4.6 [Operating Systems, Security and Protection—Access controls, K.6.5 [Management of Computing and Information Systems, Security and Protection, F.2.2 [Analysis of Algorithms and Problem Complexity, Nonnumerical Algorithms and Problems—Complexity of proof procedures General Terms Security, Theory, Languages Keywords Access Control, Separation of Duty, Policy Design
Dateibeschreibung: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.87.5374; http://www.cs.purdue.edu/homes/ninghui/papers/algebra_ccs06.pdf
-
3
Autoren: et al.
Weitere Verfasser: et al.
Schlagwörter: Categories and Subject Descriptors D.4.6 [Operating Systems, Security and Protection—Access controls, K.6.5 [Management of Computing and Information Systems, Security and Protection, F.2.2 [Analysis of Algorithms and Problem Complexity, Nonnumerical Algorithms and Problems—Complexity of proof procedures General Terms Security, Theory Keywords Access Control, Fault-tolerant, Policy Design
Dateibeschreibung: application/pdf
-
4
Autoren: et al.
Weitere Verfasser: et al.
Schlagwörter: Categories and Subject Descriptors D.4.6 [Operating Systems, Security and Protection—information flow controls, D.4.6 [Oper- ating Systems, Security and Protection—access controls, D.3.4 [Programming Languages, Language Classifications—constraint and logic languages, D.3 [Programming Languages, Processors— code generation, optimization, E.1 [Data, Data Structures— arrays, lists, queues, records, F.2 [Analysis of Algorithms and Problems Complexity, Nonnumerical Algorithms and Problems— computations on discrete structures, I.2.2 [Artificial Intelligence, Automatic Programming—Program transformation, E.2 [Data, Data Storage Representations—linked representations General Terms security, algorithms, languages, performance Keywords information flow, type inference, security, algorithm, time
Dateibeschreibung: application/pdf
-
5
Autoren: et al.
Weitere Verfasser: et al.
Schlagwörter: Categories and Subject Descriptors D.4.6 [Operating Systems, Security and Protection—Access controls, K.6.5 [Management of Computing and Information Systems, Security and Protection, F.2.2 [Analysis of Algorithms and Problem Complexity, Nonnumerical Algorithms and Problems—Complexity of proof procedures General Terms Security, Theory Keywords role-based access control
Dateibeschreibung: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.320.4355; http://www.cs.purdue.edu/homes/ninghui/papers/sod_ccs04.pdf
-
6
Autoren: et al.
Weitere Verfasser: et al.
Schlagwörter: Categories and Subject Descriptors D.4.6 [Operating Systems, Security and Protection—Access controls, K.6.5 [Management of Computing and Information Systems, Security and Protection, F.2.2 [Analysis of Algorithms and Problem Complexity, Nonnumerical Algorithms and Problems—Complexity of proof procedures General Terms Security, Theory Keywords Access Control, Fault-tolerant, Policy Design
Dateibeschreibung: application/pdf
-
7
Weitere Verfasser: The Pennsylvania State University CiteSeerX Archives
Schlagwörter: lists, queues, records, F.2 [Analysis of Algorithms and Problems Complexity, Nonnumerical Algorithms and Problems— computations on discrete structures, I.2.2 [Artificial Intelligence, Automatic Programming—Program transformation General Terms security, algorithms, languages, performance Keywords access control, policy analysis, security, algorithm, time
Dateibeschreibung: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.121.9016; http://www.cs.sunysb.edu/~katia/HriTekLiu07.pdf
-
8
Autoren: et al.
Weitere Verfasser: et al.
Schlagwörter: Categories and Subject Descriptors, F.2.2 Nonnumerical Algorithms and Problems General Terms, Algorithms, Security, Theory. Keywords, differential privacy, private data analysis, privacy preserving data mining, output perturbation, sensitivity, clustering
Dateibeschreibung: application/pdf
-
9
Autoren:
Resource Type: eBook.
Schlagworte: Big data--Security measures
Categories: COMPUTERS / Security / General
PDF-Volltext ePub Volltext -
10
Autoren: et al.
Weitere Verfasser: et al.
Schlagwörter: Categories and Subject Descriptors, F.2.2 [ANALYSIS OF ALGORITHMS AND PROB- LEM COMPLEXITY, Nonnumerical Algorithms and Problems General Terms, Sensor Networks, Tracking, Complexity Additional Key Words and Phrases, Complexity, multiple hypotheses
Dateibeschreibung: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.306.5958; http://www.ists.dartmouth.edu/library/351.pdf
-
11
Autoren: et al.
Weitere Verfasser: et al.
Schlagwörter: and Protection, D.4.6 [Operating Systems, Security and Protection—Access controls, F.2.2 [Analysis of Algorithms and Problem Complexity, Nonnumerical Algorithms and Problems—Complexity of proof procedures General Terms, Security, Theory, Languages Additional Key Words and Phrases, access control, trust management, distributed system security, logic
Dateibeschreibung: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.119.4238; http://www.cs.utsa.edu/~winsboro/index_files/Papers/Safety_JACM_AcceptedVersion.pdf
-
12
Autoren: et al.
Quelle: Human Behavior & Emerging Technologies; 7/11/2025, Vol. 2025, p1-12, 12p
-
13
Autoren: et al.
Weitere Verfasser: et al.
Schlagwörter: Categories and Subject Descriptors, F. [Theory of Computation, F.2 [Analysis of Algorithms and Problem Complexity, F.2.2 [Nonnumerical Algorithms and Problems, Geometrical problems and computations. General Terms, Algorithms, Security, Theory. Keywords, Coresets, differential privacy, privacy
Dateibeschreibung: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.324.1729; http://people.csail.mit.edu/dannyf/private.pdf
-
14
Autoren: et al.
Weitere Verfasser: et al.
Schlagwörter: ity, Nonnumerical Algorithms and Problems, D.4.6 [Operating Systems, Security and Protection General Terms Algorithms, Security
Dateibeschreibung: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.584.3879; http://www.fkerschbaum.org/wpes03.pdf
-
15
Autoren:
Weitere Verfasser:
Schlagwörter: Categories and Subject Descriptors, E.3 [Data Encryption, Public-key Cryptosystems, F.1.3 [Computation by Abstract Devices, Complexity Measures and Classes—Complexity hierarchies, Relations among complexity classes, F.2.2 [Analysis of Algorithms and Problem Complexity, Nonnumerical Algorithms and Problems—Computations on discrete structures General Terms, Theory, Security, Algorithms Additional Key Words and Phrases, complexity theory, public-key cryptography, secret-key agreement, digital signatures, interactive proof systems, zero-knowledge protocols, one-way functions
Dateibeschreibung: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.342.6969; http://arxiv.org/pdf/cs/0111056v2.pdf
-
16
Weitere Verfasser: The Pennsylvania State University CiteSeerX Archives
Schlagwörter: Categories and Subject Descriptors, D.4.6 [Operating Systems, Security and Protection—Access controls, K.6.5 [Management of Computing and Information Systems, Security and Protection, F.2.2 [Analysis of Algorithms and Problem Complexity, Nonnumerical Algorithms and Problems—Complexity of proof proce- dures General Terms, Security, Theory Additional Key Words and Phrases, Access Control, Fault-tolerant, Policy Design
Dateibeschreibung: application/pdf
-
17
Autoren:
Weitere Verfasser:
Schlagwörter: Categories and Subject Descriptors, D.4.6 [Operating Systems, Security and Protection—Access controls, K.6.5 [Management of Computing and Information Systems, Security and Protec- tion, F.2.2 [Analysis of Algorithms and Problem Complexity, Nonnumerical Algorithms and Problems—Complexity of proof procedures General Terms, Security, Theory Additional Key Words and Phrases, Access control, fault-tolerant, policy design ACM Reference Format
Dateibeschreibung: application/pdf
-
18
Autoren: et al.
Weitere Verfasser: et al.
Schlagwörter: Categories and Subject Descriptors, D.4.6 [Operating Systems, Security and Protection—Access controls, K.6.5 [Management of Computing and Information Systems, Security and Protection, F.2.2 [Analysis of Algorithms and Problem Complexity, Nonnumerical Algorithms and Problems—Complexity of proof proce- dures General Terms, Security, Theory Additional Key Words and Phrases, role-based access control, separation of duty, constraints, verification, com- putational
Dateibeschreibung: application/pdf
-
19
Autoren: et al.
Weitere Verfasser: et al.
Schlagwörter: Categories and Subject Descriptors, F.2 [Analysis of Algorithms and Problem Complexity, Nonnumerical Algorithms and Problems, H.2 [Database Management, Security and integrity General Terms, Algorithms, Security, Verification Additional Key Words and Phrases, Synopses, Data streams, Outsourcing ACM Transactions on Database Systems, Vol. V, No. N, Month 20YY, Pages 1–0
Dateibeschreibung: application/pdf
-
20
Autoren: et al.
Quelle: ACM Transactions on Algorithms; 2006, Vol. 2 Issue 3, p435-472, 38p
Schlagwörter: ALGORITHMS, MATHEMATICAL analysis, APPROXIMATION theory, FUNCTIONAL analysis, MATHEMATICS, ALGEBRA
Nájsť tento článok vo Web of Science
Full Text Finder