Sciweavers

726 search results - page 65 / 146
» Securing XML data in third-party distribution systems
Sort
View
TOCS
2002
70views more  TOCS 2002»
13 years 7 months ago
Secure program partitioning
This paper presents secure program partitioning, a language-based technique for protecting confidential data during computation in distributed systems containing mutually untruste...
Steve Zdancewic, Lantian Zheng, Nathaniel Nystrom,...
CBMS
2008
IEEE
14 years 2 months ago
Behavior-Based Access Control for Distributed Healthcare Environment
Privacy and security are critical requirements for using patient profiles in distributed healthcare environments. The amalgamation of new information technology with traditional ...
Mohammad H. Yarmand, Kamran Sartipi, Douglas G. Do...
IFIP
2007
Springer
14 years 2 months ago
Lessons Learned from the Maroochy Water Breach
Supervisory control and data acquisition (SCADA) systems are widely used to monitor and control operations in electrical power distribution facilities, oil and gas pipelines, water...
Jill Slay, Michael Miller
ACSAC
2006
IEEE
14 years 1 months ago
An Internet Voting System Supporting User Privacy
This work introduces the A system1 , an Internetbased, free and open source electronic voting system which employs strong cryptography. Our system is a fully functiona...
Aggelos Kiayias, Michael Korman, David Walluck
FTDCS
1999
IEEE
14 years 5 days ago
Markup Meets Middleware
We describe a distributed system architecture that supports the integration of different front-office trading systems with middle and back-office systems, each of which have been ...
Wolfgang Emmerich, Walter Schwarz, Anthony Finkels...