Sciweavers

881 search results - page 16 / 177
» Secure Personal Data Servers: a Vision Paper
Sort
View
SIGADA
2004
Springer
14 years 28 days ago
Enforcing security and safety models with an information flow analysis tool
Existing security models require that information of a given security level be prevented from “leaking” into lower-security information. High-security applications must be dem...
Roderick Chapman, Adrian Hilton
IAT
2007
IEEE
14 years 1 months ago
A Design of Client Side Information Management Method for Web Services Collaboration
In this paper, we propose a client side information management method for web services collaboration. Recently, personalization is one of the most challenging topics of the web te...
Hajime Hotta, Takashi Nozawa, Masafumi Hagiwara
ACSAC
2007
IEEE
14 years 1 months ago
Centralized Security Labels in Decentralized P2P Networks
This paper describes the design of a peer-to-peer network that supports integrity and confidentiality labeling of shared data. A notion of data ownership privacy is also enforced...
Nathalie Tsybulnik, Kevin W. Hamlen, Bhavani M. Th...
CCS
2009
ACM
14 years 2 months ago
A practical property-based bootstrap architecture
Binary attestation, as proposed by the Trusted Computing Group (TCG), is a pragmatic approach for software integrity protection and verification. However, it has also various sho...
René Korthaus, Ahmad-Reza Sadeghi, Christia...
INFOCOM
2010
IEEE
13 years 6 months ago
Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing
—Cloud computing is an emerging computing paradigm in which resources of the computing infrastructure are provided as services over the Internet. As promising as it is, this para...
Shucheng Yu, Cong Wang, Kui Ren, Wenjing Lou