Sciweavers

2057 search results - page 183 / 412
» Distributed Secure Systems: Then and Now
Sort
View
ICDCS
2010
IEEE
15 years 2 months ago
Secure Ranked Keyword Search over Encrypted Cloud Data
As Cloud Computing becomes prevalent, sensitive information are being increasingly centralized into the cloud. For the protection of data privacy, sensitive data has to be encrypte...
Cong Wang, Ning Cao, Jin Li, Kui Ren, Wenjing Lou
145
Voted
ICPP
2005
IEEE
15 years 10 months ago
Session-Based Adaptive Overload Control for Secure Dynamic Web Applications
As dynamic web content and security capabilities are becoming popular in current web sites, the performance demand on application servers that host the sites is increasing, leadin...
Jordi Guitart, David Carrera, Vicenç Beltra...
IPPS
2005
IEEE
15 years 10 months ago
Characterizing Secure Dynamic Web Applications Scalability
Security in the access to web contents and the interaction with web sites is becoming one of the most important issues in Internet. Servers need to provide certain levels of secur...
Jordi Guitart, Vicenç Beltran, David Carrer...
ECOOPW
1999
Springer
15 years 9 months ago
Providing Policy-Neutral and Transparent Access Control in Extensible Systems
Extensible systems, such as Java or the SPIN extensible operating system, allow for units of code, or extensions, to be added to a running system in almost arbitrary fashion. Exte...
Robert Grimm, Brian N. Bershad
CCS
2010
ACM
15 years 4 months ago
Secure latency estimation with treeple
A network latency estimation scheme associates a "position" to every peer in a distributed network such that the latency between any two nodes can be accurately estimate...
Eric Chan-Tin, Nicholas Hopper