Sciweavers

1597 search results - page 102 / 320
» Securing Wireless Data: System Architecture Challenges
Sort
View
BCS
2008
13 years 12 months ago
Tools for Traceable Security Verification
Dependable systems evolution has been identified by the UK Computing Research Committee (UKCRC) as one of the current grand challenges for computer science. We present work toward...
Jan Jürjens, Yijun Yu, Andreas Bauer 0002
ICDCS
2011
IEEE
12 years 10 months ago
Privacy-Preserving Query over Encrypted Graph-Structured Data in Cloud Computing
— In the emerging cloud computing paradigm, data owners become increasingly motivated to outsource their complex data management systems from local sites to the commercial public...
Ning Cao, Zhenyu Yang, Cong Wang, Kui Ren, Wenjing...
IMCS
2007
77views more  IMCS 2007»
13 years 10 months ago
Incident response requirements for distributed security information management systems
Purpose – Security information management systems (SIMs) have been providing a unified distributed platform for the efficient management of security information produced by co...
Sarandis Mitropoulos, Dimitrios Patsos, Christos D...
SIGMOD
2008
ACM
85views Database» more  SIGMOD 2008»
14 years 10 months ago
The ORCHESTRA Collaborative Data Sharing System
Sharing structured data today requires standardizing upon a single schema, then mapping and cleaning all of the data. This results in a single queriable mediated data instance. Ho...
Zachary G. Ives, Todd J. Green, Grigoris Karvounar...
ICMB
2005
IEEE
101views Business» more  ICMB 2005»
14 years 4 months ago
Mobile Ticketing System Employing TrustZone Technology
Security in mobile commerce is becoming more important due to increasing demand from users wishing to perform online transactions over mobile devices. Security is one of the criti...
Wan Huzaini Wan Hussin, Paul Coulton, Reuben Edwar...