Sciweavers

726 search results - page 28 / 146
» An Access Control Scheme for Protecting Personal Data
Sort
View
ICIP
2010
IEEE
13 years 5 months ago
Security analysis for privacy preserving search of multimedia
With the increasing popularity of digital multimedia such as images and videos and the advent of the cloud computing paradigm, a fast growing amount of private and sensitive multi...
Wenjun Lu, Avinash L. Varna, Min Wu
INFOCOM
2010
IEEE
13 years 6 months ago
Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing
—Cloud computing is an emerging computing paradigm in which resources of the computing infrastructure are provided as services over the Internet. As promising as it is, this para...
Shucheng Yu, Cong Wang, Kui Ren, Wenjing Lou
ASPLOS
2006
ACM
13 years 9 months ago
Tradeoffs in fine-grained heap memory protection
Different uses of memory protection schemes have different needs in terms of granularity. For example, heap security can benefit from chunk separation (by using protected "pa...
Jianli Shen, Guru Venkataramani, Milos Prvulovic
SISW
2005
IEEE
14 years 1 months ago
Towards Protecting Sensitive Files in a Compromised System
Protecting sensitive files from a compromised system helps administrator to thwart many attacks, discover intrusion trails, and fast restore the system to a safe state. However, ...
Xin Zhao, Kevin Borders, Atul Prakash
EUROPKI
2005
Springer
14 years 1 months ago
A Heterogeneous Network Access Service Based on PERMIS and SAML
Abstract The expansion of inter-organizational scenarios based on different authorization schemes involves the development of integration solutions allowing different authorizatio...
Gabriel López Millán, Óscar C...