We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. GUCON: A Generic Graph Pattern Based Policy Framework for Usage Control Enforcement

    Robust Usage Control (UC) mechanisms are necessary to protect sensitive data and resources, especially when these are distributed across multiple...
    Ines Akaichi, Giorgos Flouris, ... Sabrina Kirrane in Rules and Reasoning
    Conference paper 2023
  2. The Tension between National and Local Concerns in Preparing for Large-Scale Generic Systems in Healthcare

    Large-scale generic systems are typically adapted to local practice through configuration. This is especially important in healthcare, which involves...

    Gunnar Ellingsen, Morten Hertzum, Line Melby in Computer Supported Cooperative Work (CSCW)
    Article Open access 16 March 2022
  3. Generic constructions of master-key KDM secure attribute-based encryption

    Master-key key-dependent message (mKDM) security is a strong security notion for attribute-based encryption (ABE) schemes, which has been...

    Jiaxin Pan, Chen Qian, Benedikt Wagner in Designs, Codes and Cryptography
    Article 09 September 2023
  4. Updatable Policy-Compliant Signatures

    Policy-compliant signatures (PCS) are a recently introduced primitive by Badertscher et al. [TCC 2021] in which a central authority distributes...
    Christian Badertscher, Monosij Maitra, ... Hendrik Waldner in Public-Key Cryptography – PKC 2024
    Conference paper 2024
  5. Predicate encryption with selective-opening security for receivers: formal definition, generic construction, and concrete instantiations for several primitives

    With the rise of cloud computing, multi-user scenarios have become a common setting for data sharing nowadays. The conservative security notion might...

    Yi-Fan Tseng, Zi-Yuan Liu, Raylin Tso in Designs, Codes and Cryptography
    Article 20 January 2024
  6. A comprehensive AI policy education framework for university teaching and learning

    This study aims to develop an AI education policy for higher education by examining the perceptions and implications of text generative AI...

    Article Open access 07 July 2023
  7. On the use of generic types for smart contracts

    This paper shows that generic types ( generics ) are useful for writing more abstract and more general smart contracts, but this comes with some...

    Fausto Spoto, Sara Migliorini, ... Andrea Benini in Cluster Computing
    Article Open access 09 August 2022
  8. Traceable Policy-Based Signatures with Delegation

    In PKC 2014, a policy-based signature (PBS) scheme was proposed by Bellare and Fuchsbauer in which a signer can only sign messages conforming to some...
    Ismail Afia, Riham AlTawy in Cryptology and Network Security
    Conference paper 2023
  9. A certified access control policy language: TEpla

    Access control is an information security process which guards protected resources against unauthorized access, as specified by restrictions in...

    Article 28 August 2023
  10. Unlinkable Policy-Based Sanitizable Signatures

    In CT-RSA 2020, P3S was proposed as the first policy-based sanitizable signature scheme, allowing the signer to designate future message sanitizers...
    Ismail Afia, Riham AlTawy in Topics in Cryptology – CT-RSA 2023
    Conference paper 2023
  11. MaskSIMD-lib: on the performance gap of a generic C optimized assembly and wide vector extensions for masked software with an Ascon-p test case

    Efficient implementations of software masked designs constitute both an important goal and a significant challenge to Side Channel Analysis attack...

    Dor Salomon, Itamar Levi in Journal of Cryptographic Engineering
    Article Open access 29 May 2023
  12. Leading the Charge on Digital Regulation: The More, the Better, or Policy Bubble?

    For about a decade, the concept of ‘digital sovereignty’ has been prominent in the European policy discourse. In the quest for digital sovereignty,...

    Cristiano Codagnone, Linda Weigl in Digital Society
    Article Open access 17 January 2023
  13. Security Policy Learning

    Security Policies define rules aiming to protect the infrastructure from insider and outsider threats. A key component to achieving this goal is...
    Elisa Bertino, Sonam Bhardwaj, ... Ashraf Y. Mahgoub in Machine Learning Techniques for Cybersecurity
    Chapter 2023
  14. Difference rewards policy gradients

    Policy gradient methods have become one of the most popular classes of algorithms for multi-agent reinforcement learning. A key challenge, however,...

    Jacopo Castellini, Sam Devlin, ... Rahul Savani in Neural Computing and Applications
    Article Open access 11 November 2022
  15. Programmable access-controlled and generic erasable PUF design and its applications

    Physical unclonable functions (PUFs) have not only been suggested as a new key storage mechanism, but—in the form of so-called strong PUFs —also as...

    Chenglu **, Wayne Burleson, ... Ulrich Rührmair in Journal of Cryptographic Engineering
    Article 21 March 2022
  16. Generic Constructions of Server-Aided Revocable ABE with Verifiable Transformation

    Attribute-based encryption (ABE) is a promising approach in cloud computing services to enable scalable access control on encrypted data....
    Feng Yang, Hui Cui, Jiwu **g in Applied Cryptography and Network Security Workshops
    Conference paper 2023
  17. How do academic public administration and public policy researchers affect policymaking? Functional grou**s from survey data

    Using data from an original survey of 409 authors of recent articles in major public administration and policy journals, we investigate the...

    John P. Nelson, Barry Bozeman, ... Spencer L. Lindsay in Scientometrics
    Article 09 November 2023
  18. Policy-Based Management

    Policy-Based Management (PBM) is a system DBAs can use to report on or enforce standards across the enterprise, when used with a Central Management...
    Chapter 2023
  19. Generic Features

    Beata Beigman Klebanov, Nitin Madnani in Automated Essay Scoring
    Chapter 2022
  20. Authorization and Policy Enforcement

    The previous chapters covered the mechanics of authorizing an API call and authenticating a user. This chapter will discuss authorization vs. the...
    Yvonne Wilson, Abhishek Hingnikar in Solving Identity Management in Modern Applications
    Chapter 2023
Did you find what you were looking for? Share feedback.