Sciweavers

8701 search results - page 60 / 1741
» Protecting information on the Web
Sort
View
RAID
1999
Springer
14 years 2 months ago
Minimizing Bandwidth for Remote Access to Cryptographically Protected Audit Logs
Tamperproof audit logs are an essential tool for computer forensics. Building on the work in [SK98,SK99], we show how to build a tamperproof audit log where the amount of informati...
John Kelsey, Bruce Schneier
CHI
2008
ACM
14 years 10 months ago
Augmented information assimilation: social and algorithmic web aids for the information long tail
To understand how and why individuals make use of emerging information assimilation services on the Web as part of their daily routine, we combined video recordings of online acti...
Brynn Evans, Stuart Card
CISS
2008
IEEE
14 years 4 months ago
Overlay protection against link failures using network coding
Abstract—This paper introduces a network coding-based protection scheme against single and multiple link failures. The proposed strategy makes sure that in a connection, each nod...
Ahmed E. Kamal, Aditya Ramamoorthy
APWEB
2011
Springer
13 years 1 months ago
SecGuard: Secure and Practical Integrity Protection Model for Operating Systems
Host compromise is a serious security problem for operating systems. Most previous solutions based on integrity protection models are difficult to use; on the other hand, usable i...
Ennan Zhai, Qingni Shen, Yonggang Wang, Tao Yang, ...
SACMAT
2005
ACM
14 years 3 months ago
Purpose based access control of complex data for privacy protection
As privacy becomes a major concern for both consumers and enterprises, many research efforts have been devoted to the development of privacy protecting technology. We recently pr...
Ji-Won Byun, Elisa Bertino, Ninghui Li