Sciweavers

94 search results - page 3 / 19
» A portable computer security workshop
Sort
View
WPES
2004
ACM
14 years 14 days ago
Privacy management for portable recording devices
The growing popularity of inexpensive, portable recording devices, such as cellular phone cameras and compact digital audio recorders, presents a significant new threat to privac...
J. Alex Halderman, Brent R. Waters, Edward W. Felt...
SP
2009
IEEE
144views Security Privacy» more  SP 2009»
14 years 1 months ago
Native Client: A Sandbox for Portable, Untrusted x86 Native Code
This paper describes the design, implementation and evaluation of Native Client, a sandbox for untrusted x86 native code. Native Client aims to give browser-based applications the...
Bennet Yee, David Sehr, Gregory Dardyk, J. Bradley...
PERVASIVE
2007
Springer
13 years 6 months ago
Securing Pocket Hard Drives
Inexpensive portable storage devices that are available in the market today have made it easier for users to carry data and programs with them and borrow computing platforms when ...
Nishkam Ravi, Chandra Narayanaswami, Mandayam T. R...
SIGMOD
2008
ACM
119views Database» more  SIGMOD 2008»
14 years 7 months ago
Report on the Principles of Provenance Workshop
Provenance, or records of the origin, context, custody, derivation or other historical information about a (digital) object, has recently become an important research topic in a n...
James Cheney, Peter Buneman, Bertram Ludäscher
GSEM
2004
Springer
14 years 13 days ago
Enhancing Java Grid Computing Security with Resource Control
Abstract. This paper outlines an original Computational Grid deployment protocol which is entirely based on Java, leveraging the portability of this language for distributing custo...
Jarle Hulaas, Walter Binder, Giovanna Di Marzo Ser...