Sciweavers

3349 search results - page 8 / 670
» Data Security
Sort
View
SP
2005
IEEE
14 years 4 months ago
Towards Constant Bandwidth Overhead Integrity Checking of Untrusted Data
Dwaine E. Clarke, G. Edward Suh, Blaise Gassend, A...
CCS
2010
ACM
13 years 11 months ago
Losing control of the internet: using the data plane to attack the control plane
Max Schuchard, Abedelaziz Mohaisen, Denis Foo Kune...
VLDB
2002
ACM
165views Database» more  VLDB 2002»
13 years 10 months ago
Chip-Secured Data Access: Confidential Data on Untrusted Servers
The democratization of ubiquitous computing (access data anywhere, anytime, anyhow), the increasing connection of corporate databases to the Internet and the today's natural ...
Luc Bouganim, Philippe Pucheral
DEXAW
2004
IEEE
98views Database» more  DEXAW 2004»
14 years 2 months ago
MetaData for Efficient, Secure and Extensible Access to Data in a Medical Grid
In this paper we present the metadata usage in a medical imaging project grid. Metadata represent data about the data: In our case, the data are medical images and the metadata sto...
Jean-Marc Pierson, Ludwig Seitz, Hector Duque, Joh...
IJNSEC
2008
110views more  IJNSEC 2008»
13 years 11 months ago
Security Measures and Weaknesses of the GPRS Security Architecture
This paper presents an evaluation of the security architecture employed in the General Packet Radio Services (GPRS). More specifically, the security measures applied to protect th...
Christos Xenakis