Sciweavers

3452 search results - page 102 / 691
» Secure Data Outsourcing
Sort
View
ICCCN
1998
IEEE
14 years 2 months ago
An Evolutionary Approach to Multilaterally Secure Services in ISDN / IN
Data protection and data security become more significant since telecommunication services and innovative applications based on these services handle an increasing amount of sensi...
Reiner Sailer
TKDE
2008
123views more  TKDE 2008»
13 years 10 months ago
DiSC: Benchmarking Secure Chip DBMS
Secure chips, e.g., present in smart cards, USB dongles, i-buttons, are now ubiquitous in applications with strong security requirements. Moreover, they require embedded data manag...
Nicolas Anciaux, Luc Bouganim, Philippe Pucheral, ...
EDBT
2004
ACM
108views Database» more  EDBT 2004»
14 years 10 months ago
A Framework for Efficient Storage Security in RDBMS
Abstract. With the widespread use of e-business coupled with the public's awareness of data privacy issues and recent database security related legislations, incorporating sec...
Balakrishna R. Iyer, Sharad Mehrotra, Einar Myklet...
CAISE
2000
Springer
14 years 2 months ago
CHAOS: An Active Security Mediation System
With the emergence of the Internet, collaborative computing has become more feasible than ever. Organizations can share valuable information among each other. However, certain user...
David Liu, Kincho H. Law, Gio Wiederhold
ICDCS
2002
IEEE
14 years 3 months ago
Key Trees and the Security of Interval Multicast
A key tree is a distributed data structure of security keys that can be used by a group of users. In this paper, we describe how any user in the group can use the different keys i...
Mohamed G. Gouda, Chin-Tser Huang, E. N. Elnozahy