Sciweavers

3452 search results - page 44 / 691
» Secure Data Outsourcing
Sort
View
ECIS
2000
13 years 11 months ago
Towards a Secure Web-Based Health Care Application
Even though security requirements in health care are traditionally high, most computerized health care applications lack sophisticated security measures or focus only on single sec...
Susanne Röhrig, Konstantin Knorr
SECRYPT
2010
147views Business» more  SECRYPT 2010»
13 years 7 months ago
Security Models for Heterogeneous Networking
Security for Next Generation Networks (NGNs) is an attractive topic for many research groups. The Y-Comm security group believes that a new security approach is needed to address t...
Glenford E. Mapp, Mahdi Aiash, Aboubaker Lasebae, ...
ICETE
2004
129views Business» more  ICETE 2004»
13 years 11 months ago
Data Mining Techniques for Security of Web Services
Manu Malek, Fotios C. Harmantzis
VEE
2012
ACM
200views Virtualization» more  VEE 2012»
12 years 5 months ago
Block storage virtualization with commodity secure digital cards
Smartphones, tablets and other mobile platforms typically accommodate bulk data storage with low-cost, FAT-formatted Secure Digital cards. When one uses a mobile device to run a f...
Harvey Tuch, Cyprien Laplace, Kenneth C. Barr, Bi ...
VLDB
2005
ACM
117views Database» more  VLDB 2005»
14 years 3 months ago
Parallel Querying with Non-Dedicated Computers
We present DITN, a new method of parallel querying based on dynamic outsourcing of join processing tasks to non-dedicated, heterogeneous computers. In DITN, partitioning is not th...
Vijayshankar Raman, Wei Han, Inderpal Narang