Sciweavers

57 search results - page 7 / 12
» Integrity Auditing of Outsourced Data
Sort
View
DGO
2007
174views Education» more  DGO 2007»
13 years 9 months ago
New techniques for ensuring the long term integrity of digital archives
A large portion of the government, business, cultural, and scientific digital data being created today needs to be archived and preserved for future use of periods ranging from a ...
Sangchul Song, Joseph JáJá
EUSAI
2004
Springer
14 years 1 months ago
Integrating Handhelds into Environments of Cooperating Smart Everyday Objects
Because of their severe resource-restrictions and limited user interfaces, smart everyday objects must often rely on remote resources to realize their services. This paper shows ho...
Frank Siegemund, Tobias Krauer
HOTOS
2003
IEEE
14 years 27 days ago
Secure Data Replication over Untrusted Hosts
Data replication is a widely used technique for achieving fault tolerance and improved performance. With the advent of content delivery networks, it is becoming more and more freq...
Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenba...
IJMI
2007
140views more  IJMI 2007»
13 years 7 months ago
Securing electronic health records without impeding the flow of information
Objective: We present an integrated set of technologies, known as the Hippocratic Database, that enable healthcare enterprises to comply with privacy and security laws without imp...
Rakesh Agrawal, Christopher M. Johnson
GI
2008
Springer
13 years 8 months ago
Simple Back-end Services for Corporate Semantic Web
In order to be adopted within corporate environments, Semantic Web applications must provide tangible short-/medium-term gains. Although corporate Semantic Web offers enterprises n...
Robert Tolksdorf, Radoslaw Oldakowski, Thomas Hopp...