Sciweavers

3452 search results - page 99 / 691
» Secure Data Outsourcing
Sort
View
TWC
2011
417views more  TWC 2011»
13 years 4 months ago
A Spatiotemporal Approach for Secure Range Queries in Tiered Sensor Networks
Abstract—We target a two-tier sensor network with resourcerich master nodes at the upper tier and resource-poor sensor nodes at the lower tier. Master nodes collect data from sen...
Jing Shi, Rui Zhang, Yanchao Zhang
SIGCSE
2005
ACM
129views Education» more  SIGCSE 2005»
14 years 3 months ago
Teaching students to hack: curriculum issues in information security
1 Teaching “hacking” as a legitimate means of training students in how to protect a future employer’s data assets has been introduced
Patricia Y. Logan, Allen Clarkson
GRID
2000
Springer
14 years 1 months ago
Data Management in an International Data Grid Project
Abstract. In this paper we report on preliminary work and architectural design carried out in the "Data Management" work package in the International Data Grid project. O...
Wolfgang Hoschek, Francisco Javier Jaén-Mar...
FAST
2003
13 years 11 months ago
Data Staging on Untrusted Surrogates
We show how untrusted computers can be used to facilitate secure mobile data access. We discuss a novel architecture, data staging, that improves the performance of distributed ...
Jason Flinn, Shafeeq Sinnamohideen, Niraj Tolia, M...
ICISC
2004
173views Cryptology» more  ICISC 2004»
13 years 11 months ago
On Private Scalar Product Computation for Privacy-Preserving Data Mining
In mining and integrating data from multiple sources, there are many privacy and security issues. In several different contexts, the security of the full privacy-preserving data mi...
Bart Goethals, Sven Laur, Helger Lipmaa, Taneli Mi...