Sciweavers

65 search results - page 6 / 13
» Fail-Aware Untrusted Storage
Sort
View
ICICS
2007
Springer
13 years 11 months ago
Time and Space Efficient Algorithms for Two-Party Authenticated Data Structures
Authentication is increasingly relevant to data management. Data is being outsourced to untrusted servers and clients want to securely update and query their data. For example, in ...
Charalampos Papamanthou, Roberto Tamassia
WETICE
2007
IEEE
14 years 2 months ago
Managing Confidential Data in the gLite Middleware
How to manage confidential data in the grid environment is a critical issue because users’ data can be saved in untrusted remote storages. This paper introduces a service to sto...
Diego Scardaci, Giordano Scuderi
IPPS
2007
IEEE
14 years 2 months ago
Combining Compression, Encryption and Fault-tolerant Coding for Distributed Storage
Storing data in distributed systems aims to offer higher bandwidth and scalability than storing locally. But, a couple of disadvantageous issues must be taken into account such as...
Peter Sobe, Kathrin Peter
OSDI
2002
ACM
14 years 8 months ago
FARSITE: Federated, Available, and Reliable Storage for an Incompletely Trusted Environment
Farsite is a secure, scalable file system that logically functions as a centralized file server but is physically distributed among a set of untrusted computers. Farsite provides ...
Atul Adya, William J. Bolosky, Miguel Castro, Gera...
TKDE
2010
370views more  TKDE 2010»
13 years 6 months ago
Anonymous Query Processing in Road Networks
—The increasing availability of location-aware mobile devices has given rise to a flurry of location-based services (LBS). Due to the nature of spatial queries, an LBS needs the...
Kyriakos Mouratidis, Man Lung Yiu