scispace - formally typeset
Search or ask a question
Topic

Proxy (statistics)

About: Proxy (statistics) is a research topic. Over the lifetime, 5257 publications have been published within this topic receiving 94504 citations. The topic is also known as: proxy variable & proxy measurement.


Papers
More filters
Patent
31 Oct 2012
TL;DR: In this article, a proxy receives, from a client node, a file to be stored by a cloud storage server, where the proxy and the client node are part of a private network that does not include the Cloud storage server.
Abstract: In one embodiment, a proxy receives, from a client node, a file to be stored by a cloud storage server, where the proxy and the client node are part of a private network that does not include the cloud storage server. The proxy retrieves an encryption key associated with a user of the client node and encrypts the file using the encryption key. The proxy then transmits the encrypted file to the cloud storage server.

101 citations

Patent
27 Dec 2007
TL;DR: In this article, the authors propose a general-purpose proxy mobile device management architecture, where the proxy serves as a proxy for a mobile client seeking services from backend systems, such that when the mobile client interacts with the proxy, the virtual image updates to the latest client state.
Abstract: A general-purpose proxy mobile device management architecture. The architecture serves as a proxy for a mobile client seeking services from backend systems. A virtual client image of state information associated with the mobile client is stored such that when the mobile client interacts with the proxy, the virtual image updates to the latest client state. Based on the changes to the state, the proxy system asynchronously accesses one or more arbitrary services of the backend systems on behalf of the mobile client. When the mobile client connects to the proxy, the proxy will have the latest services associated with the states of the virtual image, and updates the state of the mobile client. Updating and accessing occurs asynchronously on the frontend between the proxy and mobile devices and on the backend between the proxy and the backend systems.

101 citations

Journal ArticleDOI
TL;DR: A good proxy is one who has performed the same as us on an initial task requiring the ability and must be similar on related attributes so that the proxy's performance on the initial task was maximal.
Abstract: One purpose of the social comparison of abilities is to determine action possibilities-"Can I do X?" By comparing ourselves with a proxy who has attempted X, we can determine our likelihood of success. A good proxy is one who has performed the same as us on an initial task requiring the ability. In addition, however, a good proxy must be similar on related attributes so that we can be confident that the proxy's performance on the initial task was maximal. In the case of a task requiring multiple abilities, more than one proxy may be used.

101 citations

19 Sep 1991
TL;DR: American medicine is awash in forms: insurance forms, disability forms, informed-consent forms, and forms for various examinations, to name just a few.

99 citations

Proceedings ArticleDOI
27 Oct 2008
TL;DR: The first steps towards efficiently solving the problem of constructing a multi-use unidirectional proxy re-signature scheme where the proxy is only able to translate in one direction and signatures can be re-translated several times are provided.
Abstract: In 1998, Blaze, Bleumer, and Strauss suggested a cryptographic primitive termed proxy re-signature in which a proxy transforms a signature computed under Alice's secret key into one from Bob on the same message. The proxy is only semi-trusted in that it cannot learn any signing key or sign arbitrary messages on behalf of Alice or Bob. At CCS 2005, Ateniese and Hohenberger revisited this primitive by providing appropriate security definitions and efficient constructions in the random oracle model. Nonetheless, they left open the problem of constructing a multi-use unidirectional scheme where the proxy is only able to translate in one direction and signatures can be re-translated several times. This paper provides the first steps towards efficiently solving this problem, suggested for the first time 10 years ago, and presents the first multi-hop unidirectional proxy re-signature schemes. Although our proposals feature a linear signature size in the number of translations, they are the first multi-use realizations of the primitive that satisfy the requirements of the Ateniese-Hohenberger security model. The first scheme is secure in the random oracle model. Using the same underlying idea, it readily extends into a secure construction in the standard model (i.e. the security proof of which avoids resorting to the random oracle idealization). Both schemes are computationally efficient but require newly defined Diffie-Hellman-like assumptions in bilinear groups.

99 citations


Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20231,242
20222,473
2021334
2020262
2019250
2018282