Sciweavers

242 search results - page 28 / 49
» Cryptographic Cloud Storage
Sort
View
CLOUD
2010
ACM
15 years 8 months ago
Hermes: clustering users in large-scale e-mail services
Hermes is an optimization engine for large-scale enterprise e-mail services. Such services could be hosted by a virtualized e-mail service provider, or by dedicated enterprise dat...
Thomas Karagiannis, Christos Gkantsidis, Dushyanth...
207
Voted
SIGMOD
2009
ACM
149views Database» more  SIGMOD 2009»
16 years 3 months ago
CourseRank: a social system for course planning
Special-purpose social sites can offer valuable services to well-defined, closed, communities, e.g., in a university or in a corporation. The purpose of this demo is to show the c...
Benjamin Bercovitz, Filip Kaliszan, Georgia Koutri...
131
Voted
EDBT
2008
ACM
147views Database» more  EDBT 2008»
16 years 3 months ago
iDataGuard: middleware providing a secure network drive interface to untrusted internet data storage
In this demonstration, we present the design and features of iDataGuard. iDataGuard is an interoperable security middleware that allows users to outsource their file systems to he...
Ravi Chandra Jammalamadaka, Roberto Gamboni, Shara...
STORAGESS
2005
ACM
15 years 9 months ago
Ensuring data integrity in storage: techniques and applications
Data integrity is a fundamental aspect of storage security and reliability. With the advent of network storage and new technology trends that result in new failure modes for stora...
Gopalan Sivathanu, Charles P. Wright, Erez Zadok
100
Voted
STOC
2010
ACM
189views Algorithms» more  STOC 2010»
16 years 22 days ago
Near-optimal extractors against quantum storage
We give near-optimal constructions of extractors secure against quantum bounded-storage adversaries. One instantiation gives the first such extractor to achieve an output length (...
Anindya De and Thomas Vidick