Sciweavers

2217 search results - page 213 / 444
» A Data Privacy Taxonomy
Sort
View
IJWMC
2006
112views more  IJWMC 2006»
15 years 4 months ago
Security mechanisms, attacks and security enhancements for the IEEE 802.11 WLANs
: Wired Equivalent Privacy (WEP) protocol was adopted to protect authorised users from unauthorised access and eavesdropping in the IEEE 802.11 wireless LANs. It has been proven th...
Yang Xiao, Chaitanya Bandela, Xiaojiang Du, Yi Pan...
128
Voted
ICWS
2009
IEEE
15 years 1 months ago
DIALOG: Distributed Auditing Logs
Service-oriented systems facilitate business workflows to span multiple organizations (e.g. by means of Web services). As a side effect, data may be more easily transferred over o...
Christoph Ringelstein, Steffen Staab
WISTP
2010
Springer
15 years 11 months ago
Trust in Peer-to-Peer Content Distribution Protocols
Abstract. The distribution of virtual goods like multimedia data relies on the trustworthiness of the distribution system. Recent concepts for the distribution based on peer to pee...
Nicolai Kuntze, Carsten Rudolph, Andreas Fuchs
160
Voted
SDMW
2009
Springer
15 years 10 months ago
Controlling Access to XML Documents over XML Native and Relational Databases
In this paper we investigate the feasibility and efficiency of mapping XML data and access control policies onto relational and native XML databases for storage and querying. We de...
Lazaros Koromilas, George Chinis, Irini Fundulaki,...
110
Voted
IEEEARES
2008
IEEE
15 years 10 months ago
On the Possibility of Small, Service-Free Disk Based Storage Systems
For many storage providers, the cost of providing service calls exceeds the costs of the hardware being serviced. In this paper, we show that zeromaintenance, small disk arrays ar...
Jehan-François Pâris, Thomas J. E. Sc...