Sciweavers

860 search results - page 118 / 172
» On the Security of Delegation in Access Control Systems
Sort
View
CLOUDCOM
2010
Springer
13 years 5 months ago
Attaching Cloud Storage to a Campus Grid Using Parrot, Chirp, and Hadoop
The Hadoop filesystem is a large scale distributed filesystem used to manage and quickly process extremely large data sets. We want to utilize Hadoop to assist with dataintensive ...
Patrick Donnelly, Peter Bui, Douglas Thain
ACSAC
2006
IEEE
14 years 1 months ago
Protecting Privacy in Key-Value Search Systems
This paper investigates the general problem of performing key-value search at untrusted servers without loss of user privacy. Specifically, given key-value pairs from multiple ow...
Yinglian Xie, Michael K. Reiter, David R. O'Hallar...
IEEEIA
2009
13 years 5 months ago
Information Leakage Detection in Distributed Systems using Software Agent
Covert channel attacks utilize shared resources to indirectly transmit sensitive information to unauthorized parties. Current security mechanisms such as SELinux rely on tagging th...
Yung-Chuan Lee, Stephen Bishop, Hamed Okhravi, Sha...
CBMS
2008
IEEE
14 years 2 months ago
Restoring the Patient Control over Her Medical History
Paper-based folders have been widely used to coordinate cares in medical-social networks, but they introduce some burning issues (e.g. privacy protection, remote access to the fol...
Nicolas Anciaux, Mehdi Benzine, Luc Bouganim, K&ea...
CCS
2000
ACM
14 years 9 hour ago
Implementing a distributed firewall
Conventional firewalls rely on topology restrictions and controlled network entry points to enforce traffic filtering. Furthermore, a firewall cannot filter traffic it does ...
Sotiris Ioannidis, Angelos D. Keromytis, Steven M....