Sciweavers

170 search results - page 9 / 34
» Implementing and Evaluating Security Controls for an Object-...
Sort
View
CSE
2009
IEEE
14 years 2 months ago
Usable Privacy Controls for Blogs
—Web 2.0 applications, including blogs, wikis and social networking sites, pose challenging privacy issues. Many users are unaware that search engines index personal information ...
Michael Hart, Claude Castille, Rob Johnson, Amanda...
SIGMETRICS
2004
ACM
135views Hardware» more  SIGMETRICS 2004»
14 years 1 months ago
Multi-dimensional storage virtualization
Most state-of-the-art commercial storage virtualization systems focus only on one particular storage attribute, capacity. This paper describes the design, implementation and evalu...
Lan Huang, Gang Peng, Tzi-cker Chiueh
SYSTOR
2009
ACM
14 years 2 months ago
Energy and performance evaluation of lossless file data compression on server systems
Data compression has been claimed to be an attractive solution to save energy consumption in high-end servers and data centers. However, there has not been a study to explore this...
Rachita Kothiyal, Vasily Tarasov, Priya Sehgal, Er...
ACSAC
2006
IEEE
14 years 1 months ago
From Languages to Systems: Understanding Practical Application Development in Security-typed Languages
Security-typed languages are an evolving tool for implementing systems with provable security guarantees. However, to date, these tools have only been used to build simple “toyâ...
Boniface Hicks, Kiyan Ahmadizadeh, Patrick Drew Mc...
POLICY
2009
Springer
14 years 2 months ago
The Zodiac Policy Subsystem: A Policy-Based Management System for a High-Security MANET
Abstract—Zodiac (Zero Outage Dynamic Intrinsically Assurable Communities) is an implementation of a high-security MANET, resistant to multiple types of attacks, including Byzanti...
Yuu-Heng Cheng, Mariana Raykova, Alexander Poylish...