Sciweavers

726 search results - page 114 / 146
» An Access Control Scheme for Protecting Personal Data
Sort
View
COMPSEC
2010
93views more  COMPSEC 2010»
13 years 6 months ago
A secure peer-to-peer backup service keeping great autonomy while under the supervision of a provider
Making backup is so cumbersome and expensive that individuals hardly ever backup their data and companies usually duplicate their data into a secondary server. This paper proposes...
Houssem Jarraya, Maryline Laurent
DEXAW
2003
IEEE
97views Database» more  DEXAW 2003»
14 years 1 months ago
Information Mapping and Indexing in DAYS
DAta in Your Space (DAYS) is an information dissemination system, which aims to provide desired information to use users through wireless channels. DAYS pushes data and control in...
Nimisha Garg, Vijay Kumar, Margaret H. Dunham
IAJIT
2010
157views more  IAJIT 2010»
13 years 6 months ago
Fast Cryptographic Privacy Preserving Association Rules Mining on Distributed Homogenous Database
: Privacy is one of the most important properties of an information system must satisfy, in which systems the need to share information among different, not trusted entities, the p...
Ashraf El-Sisi
CCS
2009
ACM
14 years 8 months ago
Logging key assurance indicators in business processes
Management of a modern enterprise is based on the assumption that executive reports of lower-layer management are faithful to what is actually happening in the field. As some well...
Fabio Massacci, Gene Tsudik, Artsiom Yautsiukhin
LCTRTS
2007
Springer
14 years 1 months ago
Compiler-managed partitioned data caches for low power
Set-associative caches are traditionally managed using hardwarebased lookup and replacement schemes that have high energy overheads. Ideally, the caching strategy should be tailor...
Rajiv A. Ravindran, Michael L. Chu, Scott A. Mahlk...