Sciweavers

574 search results - page 56 / 115
» Responsive Security for Stored Data
Sort
View
SP
2010
IEEE
212views Security Privacy» more  SP 2010»
13 years 11 months ago
State of the Art: Automated Black-Box Web Application Vulnerability Testing
—Black-box web application vulnerability scanners are automated tools that probe web applications for security vulnerabilities. In order to assess the current state of the art, w...
Jason Bau, Elie Bursztein, Divij Gupta, John C. Mi...
PET
2007
Springer
14 years 1 months ago
Enforcing P3P Policies Using a Digital Rights Management System
The protection of privacy has gained considerable attention recently. In response to this, new privacy protection systems are being introduced. SITDRM is one such system that prote...
Farzad Salim, Nicholas Paul Sheppard, Reihaneh Saf...
DASFAA
2008
IEEE
163views Database» more  DASFAA 2008»
14 years 2 months ago
Automated Data Discovery in Similarity Score Queries
A vast amount of information is being stored in scientific databases on the web. The dynamic nature of the scientific data, the cost of providing an up-to-date snapshot of the wh...
Fatih Altiparmak, Ali Saman Tosun, Hakan Ferhatosm...
ECEH
2006
155views Healthcare» more  ECEH 2006»
13 years 9 months ago
A Data Network for Health e-Research
: Sharing health data for research purposes across data custodian boundaries poses technical, organisational and ethical challenges. We describe a service oriented architecture for...
Kerry L. Taylor, Christine M. O'Keefe, John Colton...
CHES
2005
Springer
281views Cryptology» more  CHES 2005»
14 years 1 months ago
Data Remanence in Flash Memory Devices
Data remanence is the residual physical representation of data that has been erased or overwritten. In non-volatile programmable devices, such as UV EPROM, EEPROM or Flash, bits ar...
Sergei P. Skorobogatov