Filters








18,397 Hits in 3.2 sec

Compact and Anonymous Role-Based Authorization Chain

Danfeng Yao, Roberto Tamassia
2009 ACM Transactions on Privacy and Security  
We introduce a decentralized delegation model called anonymous role-based cascaded delegation.  ...  To provide an efficient storage and transmission mechanism for credentials used in anonymous role-based cascaded delegation, we present a new digital signature scheme that supports both signer anonymity  ...  ACKNOWLEDGEMENTS The authors would like to thank Anna Lysyanskaya and anonymous reviewers for their helpful comments and suggestions.  ... 
doi:10.1145/1455526.1455528 fatcat:u7jafl42yrejrf4iyo2xdnsevq

Domain-Specific OWL Ontology Visualization with OWLGrEd [chapter]

Karlis Cerans, Renars Liepins, Arturs Sprogis, Julija Ovcinnikova, Guntis Barzdins
2015 Lecture Notes in Computer Science  
The OWLGrEd ontology editor allows graphical visualization and authoring of OWL 2.0 ontologies using a compact yet intuitive presentation that combines UML class diagram notation with textual Manchester  ...  The usage of OWLGrEd and its extensions is demonstrated on ontology engineering examples involving custom annotation visualizations, advanced UML class diagram constructs and integrity constraints in semantic  ...  The principal OWLGrEd usage tool chains are: -ontology authoring (create and edit an ontology in OWLGrEd, then export it to Protégé to analyze and possibly submit it to other ontology processing tools)  ... 
doi:10.1007/978-3-662-46641-4_38 fatcat:fdradvtzjfhy5ium4mq3rdw7g4

Shadowing, ergodic shadowing and uniform spaces

Seyyed Ahmadi
2017 Filomat  
We introduce and study the topological concepts of ergodic shadowing, chain transitivity and topological ergodicity for dynamical systems on non-compact non-metrizable spaces.  ...  We prove that a dynamical system with topological ergodic shadowing property is topologically chain transitive, and that topological chain transitivity together with topological shadowing property implies  ...  Acknowledgment I would like to thank the anonymous referee for the excellent job.  ... 
doi:10.2298/fil1716117a fatcat:jmmumlttkrbwflew3bh3xaaovm

Development of Privacy-Preservation of Big Data with support of Hyperledger Fabric and IPFS

2021 International Journal of Advanced Trends in Computer Science and Engineering  
The authors propose leveraging Blockchain and IPFS to create the ChainPPDM approach for preserving big data privacy.  ...  This study introduces a novel way for data mining privacy protection based on Blockchain and the InterPlanetary File System (IPFS) (PPDM).  ...  ACKNOWLEDGEMENT The authors are thankful to the GMB staff members, Dr. Nalin Jani, KSV and Dr. Seema Mahajan, IU for their best cooperation, support and guidance.  ... 
doi:10.30534/ijatcse/2021/011052021 fatcat:gi63xynx5rdmnbte2hz365ygne

Global Corporate Sustainability Report 2013

2013 UN Global Compact Reports  
These developments challenge the traditional forms of authority and make transparency a necessary tool for management.  ...  participant base.  ... 
doi:10.5848/ungc.5720.2014.0009 fatcat:qfk27g7mnjhi7nwnxrxm7jkyve

Topological entropy, pseudo-orbits and uniform spaces

Kesong Yan, Fanping Zeng
2016 Topology and its Applications  
We introduce the notions of pseudo-orbit entropy, periodic pseudoorbit entropy and pseudo-orbit point entropy for continuous maps on compact uniform spaces, and study their relationships with the topological  ...  But a pseudo-orbit can be used to approximate the real orbit, and so there has been a lot of applications in many fields, for instance, Grebogi, Hammel and Yorke [10, 11] have investigated the role of  ...  I thank the anonymous referee for his/her helpful comments and suggestions that improved the manuscript. Part of this work was carried out when Yan visited NCTS.  ... 
doi:10.1016/j.topol.2016.07.016 fatcat:mexuefsazzgmpa5cwnzaleoniy

A Supplementary Tool for Web-archiving Using Blockchain Technology

John E. De Villiers, André P. Calitz
2020 The African journal of information and communication  
Repudiation Chain aims to offer unalterable assurance that a specific file and its URL existed at a given point in time—by generating a compact, non-reversible representation of the file at the time of  ...  This article outlines the initial development and testing of a decentralised application (DApp), provisionally named Repudiation Chain, as a potential tool to help address these challenges presented by  ...  of file timestamp hash of file Anonymity Derived from Ethereum's and device's anonymity Derived from Bitcoin's, browser's and device's anonymity  ... 
doi:10.23962/10539/29194 fatcat:lt4fhanptja2tk5dwgzffht5cm

On Preventing Location Attacks for Urban Vehicular Networks

Meng Zhou, Xin Li, Lejian Liao
2016 Mobile Information Systems  
In this paper, we proposed a sophisticated prediction model to predict driver's next location by using a k-order Markov chain-based third-rank tensor representing the partially observed transfer information  ...  We argue that such data contains rich informative cues on drivers' private behaviors and preferences, which will lead to the location privacy attacks.  ...  Acknowledgments The authors would also like to thank Dr. Xiaofeng  ... 
doi:10.1155/2016/5850670 fatcat:7o7mx4xccbdxdfg5ipvy7nmoq4

Hsien Wu and his major contributions to the chemical era of immunology

Mohammad Ebrahimi
2021 Open Chemistry  
chemical approaches and theories.  ...  Wu has solved one of the most serious issues on the accurate perception of immunology, and he made quick and universal attention in this regard.  ...  The author thanks the two anonymous reviewers for critical comments that improved this text's earlier version. Conflict of interest: The authors declare no conflict of interest.  ... 
doi:10.1515/chem-2020-0091 fatcat:63uvg5kdwjcoxnxngd3huoxsvm

Overlapping Phenotype of Cardiomyopathy in a Patient with Double Mutation: A Case Report

Sigita Glaveckaitė, Violeta Mikštienė, Eglė Preikšaitienė, Rimvydas Norvilas, Ramūnas Janavičius, Nomeda Rima Valevičienė
2021 Cardiogenetics  
To better understand associations between specific genetic variants and phenotypical expression of these genetic alterations and to stratify patient risk and decide on the most appropriate treatment, a  ...  Hypertrophic cardiomyopathy and left ventricular noncompaction commonly occur as separate disorders with distinct clinical and pathoanatomical features.  ...  up to 16 mm (Figure 1E ,F) and hypertrabeculation of midventricular segments with a ratio of non-compacted and compacted myocardium up to 2.8 at end-diastole (Figure 1C ,D; Supplementary Videos S1-S5  ... 
doi:10.3390/cardiogenetics11010005 doaj:7e378e29b4f3483497dc86f5f97dfaad fatcat:xoe2hvole5bi5meexefflkkvny

A Conley-type decomposition of the strong chain recurrent set

OLGA BERNARDI, ANNA FLORIO
2017 Ergodic Theory and Dynamical Systems  
For a continuous flow on a compact metric space, the aim of this paper is to prove a Conley-type decomposition of the strong chain recurrent set.  ...  We then show that strongly stable sets play the role of attractors in the decomposition of the strong chain recurrent set; indeed, we prove that the strong chain recurrent set coincides with the intersection  ...  The authors are sincerely in debt with the anonymous referee who proposed to use the name "strongly stable set" and explained the relation between strongly stable and stable sets.  ... 
doi:10.1017/etds.2017.70 fatcat:amfo62m7mje2ne6clyt2jmxivm

Digital signature scheme for information non-repudiation in blockchain: a state of the art review

Weidong Fang, Wei Chen, Wuxiong Zhang, Jun Pei, Weiwei Gao, Guohui Wang
2020 EURASIP Journal on Wireless Communications and Networking  
methods, security, and performance.  ...  Secondly, the typical digital signature schemes in blockchain are classified and analyzed, and then the state-of-the-art digital signatures are investigated and compared in terms of application fields,  ...  WG and GW mainly added to and revised the related works. All of the authors equally contributed to reviewing the manuscript. All authors read and approved the final manuscript.  ... 
doi:10.1186/s13638-020-01665-w fatcat:wnp4uxzixzfzngxnerlkbewame

Applications of order-theoretic fixed point theorems to discontinuous quasi-equilibrium problems

Congjun Zhang, Yuehu Wang
2015 Fixed Point Theory and Applications  
Some existence theorems of solutions to quasi-equilibrium problems are obtained on Hilbert lattices, chain-complete lattices and chain-complete posets, respectively.  ...  In this paper, we apply order-theoretic fixed point theorems and isotone selection theorems to study quasi-equilibrium problems.  ...  Acknowledgements The authors sincerely thank the anonymous reviewers and editor for their valuable suggestions, which improved the presentation of this paper.  ... 
doi:10.1186/s13663-015-0306-5 fatcat:phitrf4xmfd2zie3au5r33b5vy

Kinetics of chromosome condensation in the presence of topoisomerases: a phantom chain model

J.L. Sikorav, G. Jannink
1994 Biophysical Journal  
Using a known model describing the collapse of homopolymers, we propose that the compaction process necessitates a change in the topological state (i.e., a self-knotting) of the chromosomal chain.  ...  A phantom chain model for the condensation process, in which each potential entanglement point is dealt with by a topoisomerase 11 molecule, is proposed.  ...  We were greatly helped by the remarks of an anonymous referee.  ... 
doi:10.1016/s0006-3495(94)80859-8 pmid:8011915 pmcid:PMC1275781 fatcat:ozdjq4bp3nfj7aivkeeenlli6e

Blockchain and Data Protection: A Compatible Couple?

Ceyhun Necati Pehlivan, Inés Isidro Read
2020 Global Privacy Law Review  
As various European institutions and data protection authorities point out, this type of technologies may, by its very nature, be unable to comply with the General Data Protection Regulation (GDPR).  ...  Thus, the impact of blockchain on the privacy and personal data of data subjects generally requires analysis on a case-by-case basis.  ...  As mentioned, the hash function is the common technique on which the blockchain is based in order to compact and pseudonymize the data in the network.  ... 
doi:10.54648/gplr2020005 fatcat:rchm4wedobe7rlmcfm73i4rm5u
« Previous Showing results 1 — 15 out of 18,397 results