Sciweavers

2270 search results - page 270 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
NOSSDAV
2009
Springer
15 years 11 months ago
Probabilistic event resolution with the pairwise random protocol
Peer-to-peer distributed virtual environments (DVE's) distribute state tracking and state transitions. Many DVE's - such as online games - require ways to fairly determi...
John L. Miller, Jon Crowcroft
ICDCS
2008
IEEE
15 years 11 months ago
Strong WORM
We introduce a Write-Once Read-Many (WORM) storage system providing strong assurances of data retention and compliant migration, by leveraging trusted secure hardware in close dat...
Radu Sion
ISCAS
2008
IEEE
129views Hardware» more  ISCAS 2008»
15 years 11 months ago
Physical unclonable function with tristate buffers
— The lack of robust tamper-proofing techniques in security applications has provided attackers the ability to virtually circumvent mathematically strong cryptographic primitive...
Erdinç Öztürk, Ghaith Hammouri, B...
CIKM
2005
Springer
15 years 10 months ago
Privacy leakage in multi-relational databases via pattern based semi-supervised learning
In multi-relational databases, a view, which is a context- and content-dependent subset of one or more tables (or other views), is often used to preserve privacy by hiding sensiti...
Hui Xiong, Michael Steinbach, Vipin Kumar
HICSS
2006
IEEE
73views Biometrics» more  HICSS 2006»
15 years 10 months ago
Determining Success for Different Website Goals
In building a successful website it is imperative that the design matches the organization’s objectives, which should be well defined. Clearly, different types of websites will ...
L. Christian Schaupp, Weiguo Fan, France Belanger