Sciweavers

78 search results - page 13 / 16
» Managing Trusted Keys in Internet-Scale Systems
Sort
View
DEBU
2007
141views more  DEBU 2007»
13 years 9 months ago
Issues in Building Practical Provenance Systems
The importance of maintaining provenance has been widely recognized, particularly with respect to highly-manipulated data. However, there are few deployed databases that provide p...
Adriane Chapman, H. V. Jagadish
SRDS
2003
IEEE
14 years 3 months ago
Pesto Flavoured Security
We demonstrate that symmetric-key cryptography can be used for both read and write access control. One-time write access can be granted by handing over an encryption key, and our ...
Feike W. Dillema, Tage Stabell-Kulø
EUSAI
2003
Springer
14 years 3 months ago
Ubiquitous Attentiveness - Enabling Context-Aware Mobile Applications and Services
Abstract. We present a concept called ‘ubiquitous attentiveness’: Context information concerning the user and his environment is aggregated, exchanged and constitutes triggers ...
Herma Van Kranenburg, Alfons H. Salden, Henk Eerti...
ASPLOS
2012
ACM
12 years 5 months ago
Architectural support for hypervisor-secure virtualization
Virtualization has become a standard part of many computer systems. A key part of virtualization is the all-powerful hypervisor which manages the physical platform and can access ...
Jakub Szefer, Ruby B. Lee
ATAL
2005
Springer
14 years 3 months ago
Access control with safe role assignment for mobile agents
Mobile agent systems provide new perspectives for distributed e-commerce applications. Sea-of-Data (SoD) applications are those that need to process huge quantities of distributed...
Guillermo Navarro, Joan Borrell, Jose A. Ortega-Ru...