Sciweavers

3452 search results - page 34 / 691
» Secure Data Outsourcing
Sort
View
IWSEC
2010
Springer
13 years 7 months ago
Security Metrics and Security Investment Models
Abstract. Planning information security investment is somewhere between art and science. This paper reviews and compares existing scientific approaches and discusses the relation ...
Rainer Böhme
CCS
2007
ACM
14 years 2 months ago
Provable data possession at untrusted stores
Giuseppe Ateniese, Randal C. Burns, Reza Curtmola,...
SP
2005
IEEE
14 years 2 months ago
Towards Constant Bandwidth Overhead Integrity Checking of Untrusted Data
Dwaine E. Clarke, G. Edward Suh, Blaise Gassend, A...
CCS
2010
ACM
13 years 8 months ago
Losing control of the internet: using the data plane to attack the control plane
Max Schuchard, Abedelaziz Mohaisen, Denis Foo Kune...
AIMS
2010
Springer
14 years 1 months ago
Scalable Service Performance Monitoring
Abstract. Dependable performance measurement is a common requirement for all on-line services. The ongoing tendency to outsource not only infrastructure, but also software parts to...
Idilio Drago, Aiko Pras