Sciweavers

2270 search results - page 81 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
HPCC
2007
Springer
14 years 2 months ago
Security Enhancement and Performance Evaluation of an Object-Based Storage System
Object-based storage offloads some works of file systems to storage devices to improve security, scalability, and performance. Security is a main concern when sharing data over ne...
Po-Chun Liu, Sheng-Kai Hung, Yarsun Hsu
SP
2009
IEEE
155views Security Privacy» more  SP 2009»
14 years 3 months ago
A Logic of Secure Systems and its Application to Trusted Computing
We present a logic for reasoning about properties of secure systems. The logic is built around a concurrent programming language with constructs for modeling machines with shared ...
Anupam Datta, Jason Franklin, Deepak Garg, Dilsun ...
BNCOD
2006
85views Database» more  BNCOD 2006»
13 years 10 months ago
Trust Obstacle Mitigation for Database Systems
This paper introduces the Trust Obstacle Mitigation Model (TOMM), which uses the concept of trust assumptions to derive security obstacles, and the concept of misuse cases to model...
Victor Page, Robin C. Laney, Maurice Dixon, Charle...
CBMS
2000
IEEE
14 years 1 months ago
Use of Shape Models to Search Digitized Spine X-rays
We are building a biomedical information resource consisting of digitized x-ray images and associated textual data from national health surveys. This resource, the Web-based Medic...
L. Rodney Long, George R. Thoma
PERCOM
2011
ACM
13 years 3 months ago
AnonySense: A system for anonymous opportunistic sensing
We describe AnonySense, a privacy-aware system for realizing pervasive applications based on collaborative, opportunistic sensing by personal mobile devices. AnonySense allows app...
Minho Shin, Cory Cornelius, Daniel Peebles, Apu Ka...