Sciweavers

232 search results - page 23 / 47
» Credentials-Based Authorization: Evaluation and Implementati...
Sort
View
COMPSEC
2010
93views more  COMPSEC 2010»
13 years 8 months ago
A secure peer-to-peer backup service keeping great autonomy while under the supervision of a provider
Making backup is so cumbersome and expensive that individuals hardly ever backup their data and companies usually duplicate their data into a secondary server. This paper proposes...
Houssem Jarraya, Maryline Laurent
CHI
2008
ACM
14 years 10 months ago
A user study of policy creation in a flexible access-control system
Significant effort has been invested in developing expressive and flexible access-control languages and systems. However, little has been done to evaluate these systems in practic...
Lujo Bauer, Lorrie Faith Cranor, Robert W. Reeder,...
ICS
2000
Tsinghua U.
14 years 1 months ago
Improving parallel system performance by changing the arrangement of the network links
The Midimew network is an excellent contender for implementing the communication subsystem of a high performance computer. This network is an optimal 2D topology in the sense ther...
Valentin Puente, Cruz Izu, José A. Gregorio...
EDBT
2009
ACM
208views Database» more  EDBT 2009»
14 years 4 months ago
Flexible and efficient querying and ranking on hyperlinked data sources
There has been an explosion of hyperlinked data in many domains, e.g., the biological Web. Expressive query languages and effective ranking techniques are required to convert this...
Ramakrishna Varadarajan, Vagelis Hristidis, Louiqa...
ACSAC
2006
IEEE
14 years 3 months ago
Foreign Code Detection on the Windows/X86 Platform
As new attacks against Windows-based machines emerge almost on a daily basis, there is an increasing need to “lock down” individual users’ desktop machines in corporate comp...
Susanta Nanda, Wei Li, Lap-Chung Lam, Tzi-cker Chi...