Sciweavers

112 search results - page 5 / 23
» Secure and Portable Database Extensibility
Sort
View
ESORICS
2002
Springer
14 years 6 months ago
Authentication for Distributed Web Caches
We consider the problem of offloading secure access-controlled content from central origin servers to distributed caches so clients can access a proximal cache rather than the orig...
James Giles, Reiner Sailer, Dinesh C. Verma, Sures...
SIGMOD
2009
ACM
197views Database» more  SIGMOD 2009»
14 years 7 months ago
Secure kNN computation on encrypted databases
Service providers like Google and Amazon are moving into the SaaS (Software as a Service) business. They turn their huge infrastructure into a cloud-computing environment and aggr...
Wai Kit Wong, David Wai-Lok Cheung, Ben Kao, Nikos...
SIGMOD
2010
ACM
227views Database» more  SIGMOD 2010»
13 years 12 months ago
SecureBlox: customizable secure distributed data processing
We present SecureBlox, a declarative system that uniļ¬es a distributed query processor with a security policy framework. SecureBlox decouples security concerns from system speciļ...
William R. Marczak, Shan Shan Huang, Martin Braven...
VLDB
2001
ACM
119views Database» more  VLDB 2001»
14 years 7 months ago
PicoDBMS: Scaling down database techniques for the smartcard
Smartcards are the most secure portable computing device today. They have been used successfully in applications involving money, proprietary and personal data (such as banking, h...
Philippe Pucheral, Luc Bouganim, Patrick Valduriez...
SISW
2005
IEEE
14 years 19 days ago
Adding Secure Deletion to Your Favorite File System
Files or even their names often contain conļ¬dential or secret information. Most users believe that such information is erased as soon as they delete a ļ¬le. Even those who know...
Nikolai Joukov, Erez Zadok