Sciweavers

183 search results - page 17 / 37
» SecurSight: An Architecture for Secure Information Access
Sort
View
ICDE
2007
IEEE
164views Database» more  ICDE 2007»
14 years 1 months ago
Secure Mediation of Join Queries by Processing Ciphertexts
In a secure mediated information system, confidentiality is one of the main concerns when transmitting data from datasources to clients via a mediator. We present three approache...
Joachim Biskup, Christian Tsatedem, Lena Wiese
NSPW
2004
ACM
14 years 24 days ago
Support for multi-level security policies in DRM architectures
Digital rights management systems allow copyrighted content to be commercialized in digital format without the risk of revenue loss due to piracy. Making such systems secure is no...
Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenba...
SACMAT
2009
ACM
14 years 1 months ago
xDomain: cross-border proofs of access
A number of research systems have demonstrated the benefits of accompanying each request with a machine-checkable proof that the request complies with access-control policy — a...
Lujo Bauer, Limin Jia, Michael K. Reiter, David Sw...
IEEEHPCS
2010
13 years 2 months ago
XPSoC: A reconfigurable solution for multimedia contents protection
Network Multimedia data also need to be encrypted to protect private content and access control. Considering performance constraints and embedded system issues, many hardware solu...
Linfeng Ye, Jean-Philippe Diguet, Guy Gogniat
GI
2001
Springer
13 years 12 months ago
Towards a Novel Architecture to Support Universal Location Awareness
—The rapid advances in a wide range of wireless access technologies along with an industry-wide IP-convergence have set up the stage for context-aware computing. The “location...
Amiya Bhattacharya, Abhishek Roy, Sajal K. Das