Sciweavers

574 search results - page 50 / 115
» Responsive Security for Stored Data
Sort
View
STORAGESS
2006
ACM
14 years 1 months ago
Long-term threats to secure archives
Archival storage systems are designed for a write-once, read-maybe usage model which places an emphasis on the long-term preservation of their data contents. In contrast to tradit...
Mark W. Storer, Kevin M. Greenan, Ethan L. Miller
IEEEARES
2010
IEEE
14 years 29 days ago
LSM-Based Secure System Monitoring Using Kernel Protection Schemes
—Monitoring a process and its file I/O behaviors is important for security inspection for a data center server against intrusions, malware infection and information leakage. In ...
Takamasa Isohara, Keisuke Takemori, Yutaka Miyake,...
STORAGESS
2006
ACM
14 years 1 months ago
Using free web storage for data backup
Backing up important data is crucial. A variety of causes can lead to data loss, such as disk failures, administration errors, virus infiltration, theft, and physical damage to e...
Avishay Traeger, Nikolai Joukov, Josef Sipek, Erez...
TELECARE
2004
184views Healthcare» more  TELECARE 2004»
13 years 9 months ago
Securing Mobile Agent Based Tele-Assistance Systems
Nowadays the scientific community is trying to design new techniques in the search for solving security problems in mobile agent technology. There are now some industry initiatives...
Sergio Pozo, Rafael M. Gasca, María Teresa ...
DAC
2009
ACM
13 years 5 months ago
A physical unclonable function defined using power distribution system equivalent resistance variations
For hardware security applications, the availability of secret keys is a critical component for secure activation, IC authentication and for other important applications including...
Ryan Helinski, Dhruva Acharyya, Jim Plusquellic