Sciweavers

492 search results - page 26 / 99
» Encrypted Shared Data Spaces
Sort
View
PVLDB
2010
123views more  PVLDB 2010»
13 years 6 months ago
Sharing-Aware Horizontal Partitioning for Exploiting Correlations During Query Processing
Optimization of join queries based on average selectivities is suboptimal in highly correlated databases. In such databases, relations are naturally divided into partitions, each ...
Kostas Tzoumas, Amol Deshpande, Christian S. Jense...
STORAGESS
2005
ACM
14 years 1 months ago
Pvault: a client server system providing mobile access to personal data
In this paper we describe the design for the Pvault software, which is a personal data manager that stores and retrieves data from a remote untrusted data server securely. The maj...
Ravi Chandra Jammalamadaka, Sharad Mehrotra, Nalin...
CONEXT
2008
ACM
13 years 9 months ago
Efficient IP-address lookup with a shared forwarding table for multiple virtual routers
Virtual routers are a promising way to provide network services such as customer-specific routing, policy-based routing, multi-topology routing, and network virtulization. However...
Jing Fu, Jennifer Rexford
ICMB
2006
IEEE
206views Business» more  ICMB 2006»
14 years 1 months ago
E-Pass Using DRM in Symbian v8 OS and TrustZone : Securing Vital Data on Mobile Devices
The mobile phone industry has established a large customer base market, providing a wide range of mobile applications from voice and data services to digital media such as digital...
Wan Huzaini Wan Hussin, Reuben Edwards, Paul Coult...
ADHOC
2007
104views more  ADHOC 2007»
13 years 7 months ago
An overlay approach to data security in ad-hoc networks
While it has been argued that application-layer overlay protocols can enhance services in mobile ad-hoc networks, hardly any empirical data is available on the throughput and dela...
Jörg Liebeherr, Guangyu Dong