Sciweavers

3452 search results - page 33 / 691
» Secure Data Outsourcing
Sort
View
IEEEARES
2010
IEEE
14 years 3 months ago
Patterns for Secure Boot and Secure Storage in Computer Systems
—Trusted Computing aims at enhancing the security of IT systems by using a combination of trusted hardware and software components to provide security guarantees. This includes s...
Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy
CODASPY
2012
12 years 4 months ago
Comparison-based encryption for fine-grained access control in clouds
Access control is one of the most important security mechanisms in cloud computing. However, there has been little work that explores various comparison-based constraints for regu...
Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Mengyang Yu, H...
CODASPY
2011
13 years 5 days ago
The challenge of data and application security and privacy (DASPY): are we up to it
This talk gives a personal perspective on the topic area of this new conference on data and application security and privacy, the difficult nature of the challenge we are confron...
Ravi S. Sandhu
ISI
2007
Springer
14 years 2 months ago
Geospatial Data Mining for National Security: Land Cover Classification and Semantic Grouping
Chuanjun Li, Latifur Khan, Bhavani M. Thuraisingha...