Sciweavers

127 search results - page 16 / 26
» Key Management in an Encrypting File System
Sort
View
ICCS
2003
Springer
14 years 1 months ago
Terascale I/O Solutions
PSC has architected and delivered the TCS-1 machine, a Terascale Computing System for use in unclassified research. PSC has enhanced the effective usability and utilization of this...
Nathan Stone, John Kochmar, Paul Nowoczynski, J. R...
DBSEC
2010
162views Database» more  DBSEC 2010»
13 years 10 months ago
Distributed and Secure Access Control in P2P Databases
The intent of peer data management systems (PDMS) is to share as much data as possible. However, in many applications leveraging sensitive data, users demand adequate mechanisms to...
Angela Bonifati, Ruilin Liu, Hui (Wendy) Wang
SRDS
2003
IEEE
14 years 1 months ago
Pesto Flavoured Security
We demonstrate that symmetric-key cryptography can be used for both read and write access control. One-time write access can be granted by handing over an encryption key, and our ...
Feike W. Dillema, Tage Stabell-Kulø
ACMICEC
2006
ACM
112views ECommerce» more  ACMICEC 2006»
14 years 2 months ago
Persistent information security: beyond the e-commerce threat model
This paper introduces a new class of information security solution. The core technology, to authorize and track the use of digital files, was originally developed in eCommerce app...
Merv Matson, Mihaela Ulieru
FGCS
2008
102views more  FGCS 2008»
13 years 8 months ago
Making the best of a bad situation: Prioritized storage management in GEMS
As distributed storage systems grow, the response time between detection and repair of the error becomes significant. Systems built on shared servers have additional complexity be...
Justin M. Wozniak, Paul Brenner, Douglas Thain, Aa...