Sciweavers

3452 search results - page 32 / 691
» Secure Data Outsourcing
Sort
View
CAU
2004
192views Cryptology» more  CAU 2004»
13 years 10 months ago
Encrypted? Randomised? Compromised? (When Cryptographically Secured Data is Not Secure)
Protecting data is not simply a case of encrypt and forget: even data with full cryptographic confidentiality and integrity protection can still be subject to information leakage. ...
Mike Bond, Jolyon Clulow
DMDW
2000
118views Management» more  DMDW 2000»
13 years 10 months ago
View security as the basis for data warehouse security
Access. permissions in a data warehouse are currently managed in a separate world from the sources' policies. The consequences are inconsistencies, slow response to change, a...
Arnon Rosenthal, Edward Sciore
GI
2008
Springer
13 years 9 months ago
Simple Back-end Services for Corporate Semantic Web
In order to be adopted within corporate environments, Semantic Web applications must provide tangible short-/medium-term gains. Although corporate Semantic Web offers enterprises n...
Robert Tolksdorf, Radoslaw Oldakowski, Thomas Hopp...
PKC
2009
Springer
121views Cryptology» more  PKC 2009»
14 years 9 months ago
On the Theory and Practice of Personal Digital Signatures
We take a step towards a more realistic modeling of personal digital signatures, where a human user, his mobile equipment, his PC and a server are all considered as independent pla...
Gert Læssøe Mikkelsen, Ivan Damg&arin...
PET
2005
Springer
14 years 2 months ago
Privacy in India: Attitudes and Awareness
Abstract. In recent years, numerous surveys have been conducted to assess attitudes about privacy in the United States, Australia, Canada, and the European Union. Very little infor...
Ponnurangam Kumaraguru, Lorrie Faith Cranor