Sciweavers

175 search results - page 11 / 35
» Fast and Secure Distributed Read-Only File System
Sort
View
HPDC
2010
IEEE
13 years 9 months ago
Mendel: efficiently verifying the lineage of data modified in multiple trust domains
Data is routinely created, disseminated, and processed in distributed systems that span multiple administrative domains. To maintain accountability while the data is transformed b...
Ashish Gehani, Minyoung Kim
KES
2008
Springer
13 years 7 months ago
Fast Cryptographic Privacy Preserving Association Rules Mining on Distributed Homogenous Data Base
Privacy is one of the most important properties of an information system must satisfy. In which systems the need to share information among different, not trusted entities, the pro...
Mahmoud Hussein, Ashraf El-Sisi, Nabil A. Ismail
ACSAC
2010
IEEE
13 years 6 months ago
Fast and practical instruction-set randomization for commodity systems
Instruction-set randomization (ISR) is a technique based on randomizing the "language" understood by a system to protect it from code-injection attacks. Such attacks wer...
Georgios Portokalidis, Angelos D. Keromytis
SRDS
2007
IEEE
14 years 2 months ago
Activity Monitoring to Guarantee File Availability in Structured P2P File-sharing Systems
A cooperative structured peer-to-peer file-sharing system requires that the nodes participating in the system need to maintain the location mappings of other nodes. However, the s...
Guowei Huang, Zhi Chen, Qi Zhao, Gongyi Wu
INFOCOM
2006
IEEE
14 years 2 months ago
The Index Poisoning Attack in P2P File Sharing Systems
— P2P file-sharing systems have indexes, which users search to find locations of desired titles. In the index poisoning attack, the attacker inserts massive numbers of bogus re...
Jian Liang, Naoum Naoumov, Keith W. Ross