Sciweavers

574 search results - page 28 / 115
» Responsive Security for Stored Data
Sort
View
IEEEARES
2008
IEEE
14 years 2 months ago
Towards Secure E-Commerce Based on Virtualization and Attestation Techniques
We present a secure e-commerce architecture that is resistant to client compromise and man-in-the-middle attacks on SSL. To this end, we propose several security protocols that us...
Frederic Stumpf, Claudia Eckert, Shane Balfe
SP
2007
IEEE
183views Security Privacy» more  SP 2007»
14 years 1 months ago
Ciphertext-Policy Attribute-Based Encryption
In several distributed systems a user should only be able to access data if a user posses a certain set of credentials or attributes. Currently, the only method for enforcing such...
John Bethencourt, Amit Sahai, Brent Waters
MSS
2000
IEEE
96views Hardware» more  MSS 2000»
13 years 12 months ago
APRIL: A Run-Time Library for Tape-Resident Data
Over the last decade, processors have made enormous gains in speed. But increase in the speed of the secondary and tertiary storage devices could not cope with these gains. The re...
Gokhan Memik, Mahmut T. Kandemir, Alok N. Choudhar...
IPPS
2007
IEEE
14 years 1 months ago
Challenges in Executing Data Intensive Biometric Workloads on a Desktop Grid
Desktop grids have traditionally focused on executing computation intensive workloads. Can they also be used to execute data-intensive workloads? To answer this question, we prese...
Christopher Moretti, Timothy C. Faltemier, Douglas...
DASFAA
2010
IEEE
176views Database» more  DASFAA 2010»
13 years 7 months ago
Efficient Database-Driven Evaluation of Security Clearance for Federated Access Control of Dynamic XML Documents
Achieving data security over cooperating web services is becoming a reality, but existing XML access control architectures do not consider this federated service computing. In this...
Erwin Leonardi, Sourav S. Bhowmick, Mizuho Iwaihar...