Sciweavers

370 search results - page 61 / 74
» Data versioning techniques for internet transaction manageme...
Sort
View
MSS
2007
IEEE
129views Hardware» more  MSS 2007»
14 years 1 months ago
Cryptographic Security for a High-Performance Distributed File System
Storage systems are increasingly subject to attacks. Cryptographic file systems mitigate the danger of exposing data by using encryption and integrity protection methods and guar...
Roman Pletka, Christian Cachin
IJSN
2007
106views more  IJSN 2007»
13 years 7 months ago
Hash-AV: fast virus signature scanning by cache-resident filters
Abstract— Fast virus scanning is becoming increasingly important in today’s Internet. While Moore’s law continues to double CPU cycle speed, virus scanning applications fail ...
Ozgun Erdogan, Pei Cao
WWW
2010
ACM
14 years 2 months ago
Object views: fine-grained sharing in browsers
Browsers do not currently support the secure sharing of JavaScript objects between principals. We present this problem as the need for object views, which are consistent and contr...
Leo A. Meyerovich, Adrienne Porter Felt, Mark S. M...
CAISE
2007
Springer
14 years 1 months ago
Conceptual Modeling of Privacy-Aware Web Service Protocols
Abstract. Internet users are becoming increasingly concerned about their personal information being collected and used by Web service providers. They want to ensure that it is stor...
Rachid Hamadi, Hye-Young Paik, Boualem Benatallah
INFOCOM
2000
IEEE
14 years 1 days ago
Consideration of Receiver Interest for IP Multicast Delivery
—Large-scale applications are characterized by a large number of dynamic and often interactive group members. The nature of these applications is such that participants are not i...
Brian Neil Levine, Jon Crowcroft, Christophe Diot,...