-
2
-
-
84882777898
-
-
CIPSI Lab, Department of Compuer and Electrical Engineering, UiS
-
CIPSI Lab, Department of Compuer and Electrical Engineering, UiS, "Project description - Safer@Home"
-
Project Description - Safer@Home
-
-
-
3
-
-
84882783759
-
Hadoop
-
Yahoo!, "Hadoop," http://hadoop.apache.org, 2008
-
(2008)
Yahoo!
-
-
-
4
-
-
84861072527
-
Data Security and Privacy Protection Issues in Cloud Computing
-
Mar.
-
D. Chen, H. Zhao, "Data Security and Privacy Protection Issues in Cloud Computing," International Conference on Computer Science and Electronics Engineering (ICCSEE), vol.1, pp.647-651, Mar. 2012
-
(2012)
International Conference on Computer Science and Electronics Engineering (ICCSEE)
, vol.1
, pp. 647-651
-
-
Chen, D.1
Zhao, H.2
-
5
-
-
0032164210
-
A survey of Web security
-
Sept.
-
A.D. Rubin, D. E. Geer, "A survey of Web security," Computer, vol.31, no.9, pp.34-41, Sept. 1998
-
(1998)
Computer
, vol.31
, Issue.9
, pp. 34-41
-
-
Rubin, A.D.1
Geer, D.E.2
-
6
-
-
84882754787
-
VPNCubed
-
CohesiveFT, "VPNCubed," http://www.cohesiveft.com/vpncubed/, 2008
-
(2008)
CohesiveFT
-
-
-
11
-
-
0035517699
-
Protecting respondents' identities in microdata release
-
DOI 10.1109/69.971193
-
P. Samarati, "Protecting respondents' identities in microdata release," IEEE Transactions on Knowledge Engineering, vol.13, no.6, pp.1010-1027, Nov. 2001 (Pubitemid 34035590)
-
(2001)
IEEE Transactions on Knowledge and Data Engineering
, vol.13
, Issue.6
, pp. 1010-1027
-
-
Samarati, P.1
-
15
-
-
11044223672
-
Access-control language for multidomain environments
-
DOI 10.1109/MIC.2004.53
-
J. Joshi, et al., "Access Control Language for Multi-domain Environments," IEEE Internet Computing, vol.8, no.6, pp.40-50, 2004 (Pubitemid 40043366)
-
(2004)
IEEE Internet Computing
, vol.8
, Issue.6
, pp. 40-50
-
-
Joshi, J.B.D.1
Bhatti, R.2
Bertino, E.3
Ghafoor, A.4
-
18
-
-
27944506523
-
Secure, Efficient Data Transport and Replica Management for High-Performance Data-Intensive Computing
-
Apr.
-
W. Allcook, J. Bester, et al., "Secure, Efficient Data Transport and Replica Management for High-Performance Data-Intensive Computing," Proceedings of the IEEE Mass Storage Conference, pp.13-28 Apr. 2001
-
(2001)
Proceedings of the IEEE Mass Storage Conference
, pp. 13-28
-
-
Allcook, W.1
Bester, J.2
-
22
-
-
0000072558
-
Finding a needle in a haystack - or identifying anonymous census record
-
T. Dalenius, "Finding a needle in a haystack - or identifying anonymous census record," Journal of Official Statistics, vol.2, no.3, pp.329-336, 1986
-
(1986)
Journal of Official Statistics
, vol.2
, Issue.3
, pp. 329-336
-
-
Dalenius, T.1
-
23
-
-
0030086382
-
Role-Based Access Control Models
-
Feb.
-
R. Sandhu, E. Coyne, et al., "Role-Based Access Control Models," IEEE Computer, vol.29, no.2, pp.38-47, Feb. 1996
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.2
-
25
-
-
35048844179
-
Security Analysis of SHA-256 and Sisters
-
H. Gilbert, H. Handschuh "Security Analysis of SHA-256 and Sisters," Cryptography, vol. 3006, pp.175-193, 2004
-
(2004)
Cryptography
, vol.3006
, pp. 175-193
-
-
Gilbert, H.1
Handschuh, H.2
-
26
-
-
44349162926
-
A review of smart homes - Present state and future challenges
-
Jul.
-
M. Chan, E. Esteve, et al., "A review of smart homes - Present state and future challenges," Computer Methods and Prigramns in Biomedicine, vol.91. no.1, pp.55-81, Jul. 2008
-
(2008)
Computer Methods and Prigramns in Biomedicine
, vol.91
, Issue.1
, pp. 55-81
-
-
Chan, M.1
Esteve, E.2
-
27
-
-
0036811143
-
Achieving k-anonymity privacy protection using generalization and suppression
-
DOI 10.1142/S021848850200165X
-
L. Sweeney, "Achieving k-anonymity privacy protection using generalization and suppression," International Journal on Uncertainty, Fuzziness, and Knowledge-Base Systems, vol.10, no.5, pp.571-588, 2002 (Pubitemid 35384858)
-
(2002)
International Journal of Uncertainty, Fuzziness and Knowlege-Based Systems
, vol.10
, Issue.5
, pp. 571-588
-
-
Sweeney, L.1
-
28
-
-
60549101220
-
Needing smart home technologies: The perspectives of older adults in continuing care retirement communities
-
K. Courtney, G. Demiris, et al., "Needing smart home technologies: the perspectives of older adults in continuing care retirement communities," Informatics in Primary Care, vol.16, pp.195-201, 2008
-
(2008)
Informatics in Primary Care
, vol.16
, pp. 195-201
-
-
Courtney, K.1
Demiris, G.2
-
30
-
-
3042632321
-
Inventing Wellness Systems for Aging in Place
-
May
-
E. Dishman, "Inventing Wellness Systems for Aging in Place," Computer, vol.37, no.5, pp.34-41, May, 2004
-
(2004)
Computer
, vol.37
, Issue.5
, pp. 34-41
-
-
Dishman, E.1
-
33
-
-
38549152780
-
Senior residents' perceived need of and preferences for smart home sensor technologies
-
B.
-
G. Demiris, B. Hensel BK, et al, "Senior residents' perceived need of and preferences for smart home sensor technologies," Int J Technol Assess Health Care, vol.24. no.1, pp.120-1024, 2008
-
(2008)
Int J Technol Assess Health Care
, vol.24
, Issue.1
, pp. 120-1024
-
-
Demiris, G.1
Hensel, B.K.2
-
35
-
-
10044256720
-
A survey of research on context-aware homes
-
S. Meyer, A. Rakotonirainy, "A survey of research on context-aware homes," Australian Computer Society, vol.21, pp.159-168, 2003
-
(2003)
Australian Computer Society
, vol.21
, pp. 159-168
-
-
Meyer, S.1
Rakotonirainy, A.2
-
36
-
-
52149093804
-
Sentry@Home - Leveraging the Smart Home for Privacy in Pervasive Computing
-
Jul.
-
S. Bagüés, A. Zeidler, et. al., "Sentry@Home - Leveraging the Smart Home for Privacy in Pervasive Computing," International Journal of Smart Home, vol.1, no.2, Jul. 2007
-
(2007)
International Journal of Smart Home
, vol.1
, Issue.2
-
-
Bagüés, S.1
Zeidler, A.2
-
39
-
-
33746327374
-
-
Foundations of Secure Computation, Academic Press
-
R. Rivest, L. Adleman, and M. Dertouzos, "On data banks and privacy homomorphisms," Foundations of Secure Computation, Academic Press, pp.169-177, 1978.
-
(1978)
On Data Banks and Privacy Homomorphisms
, pp. 169-177
-
-
Rivest, R.1
Adleman, L.2
Dertouzos, M.3
-
40
-
-
43949118608
-
A Survey of Homomorphic Encryption for Nonspecialists
-
C. Fontaine, F. Galand, "A Survey of Homomorphic Encryption for Nonspecialists," Journal on Information Security, vol.2004, no.15, 2007.
-
(2007)
Journal on Information Security
, vol.2004
, Issue.15
-
-
Fontaine, C.1
Galand, F.2
|