Sciweavers

726 search results - page 58 / 146
» Securing XML data in third-party distribution systems
Sort
View
FAST
2003
13 years 9 months ago
Data Staging on Untrusted Surrogates
We show how untrusted computers can be used to facilitate secure mobile data access. We discuss a novel architecture, data staging, that improves the performance of distributed ï¬...
Jason Flinn, Shafeeq Sinnamohideen, Niraj Tolia, M...
PVLDB
2010
114views more  PVLDB 2010»
13 years 6 months ago
Peer coordination through distributed triggers
This is a demonstration of data coordination in a peer data management system through the employment of distributed triggers. The latter express in a declarative manner individual...
Verena Kantere, Maher Manoubi, Iluju Kiringa, Timo...
KES
2008
Springer
13 years 6 months ago
Fast Cryptographic Privacy Preserving Association Rules Mining on Distributed Homogenous Data Base
Privacy is one of the most important properties of an information system must satisfy. In which systems the need to share information among different, not trusted entities, the pro...
Mahmoud Hussein, Ashraf El-Sisi, Nabil A. Ismail
SIGMETRICS
2000
ACM
101views Hardware» more  SIGMETRICS 2000»
14 years 7 days ago
Feasibility of a serverless distributed file system deployed on an existing set of desktop PCs
We consider an architecture for a serverless distributed file system that does not assume mutual trust among the client computers. The system provides security, availability, and ...
William J. Bolosky, John R. Douceur, David Ely, Ma...
NSDI
2010
13 years 9 months ago
Airavat: Security and Privacy for MapReduce
We present Airavat, a MapReduce-based system which provides strong security and privacy guarantees for distributed computations on sensitive data. Airavat is a novel integration o...
Indrajit Roy, Srinath T. V. Setty, Ann Kilzer, Vit...