Sciweavers

1830 search results - page 151 / 366
» Implementing a Tamper-Evident Database System
Sort
View
ICDE
2003
IEEE
180views Database» more  ICDE 2003»
14 years 12 months ago
PeerDB: A P2P-based System for Distributed Data Sharing
In this paper, we present the design and evaluation of PeerDB, a peer-to-peer (P2P) distributed data sharing system. PeerDB distinguishes itself from existing P2P systems in sever...
Wee Siong Ng, Beng Chin Ooi, Kian-Lee Tan, Aoying ...
MOBISYS
2009
ACM
14 years 11 months ago
Attacks on public WLAN-based positioning systems
In this work, we study the security of public WLAN-based positioning systems. Specifically, we investigate the Skyhook positioning system, available on PCs and used on a number of...
Nils Ole Tippenhauer, Kasper Bonne Rasmussen, Chri...
VLDB
2005
ACM
83views Database» more  VLDB 2005»
14 years 4 months ago
Indexing Data-oriented Overlay Networks
The application of structured overlay networks to implement index structures for data-oriented applications such as peer-to-peer databases or peer-to-peer information retrieval, r...
Karl Aberer, Anwitaman Datta, Manfred Hauswirth, R...
ICDE
2003
IEEE
130views Database» more  ICDE 2003»
14 years 12 months ago
StegFS: A Steganographic File System
Cryptographic file systems provide little protection against legal or illegal instruments that force the owner of data to release decryption keys for stored data once the presence ...
HweeHwa Pang, Kian-Lee Tan, Xuan Zhou
EDBT
2008
ACM
188views Database» more  EDBT 2008»
14 years 10 months ago
FAME-DBMS: Tailor-made Data Management Solutions for Embedded Systems
Data management functionality is not only needed in large-scale server systems, but also in embedded systems. Resource restrictions and heterogeneity of hardware, however, complic...
Marko Rosenmüller, Norbert Siegmund, Horst Sc...