Sciweavers

726 search results - page 84 / 146
» Securing XML data in third-party distribution systems
Sort
View
IRES
2002
63views more  IRES 2002»
13 years 7 months ago
The Semantic Web, universalist ambition and some lessons from librarianship
Building the semantic web encounters problems similar to building large bibliographic systems. The experience of librarianship in controlling large, heterogeneous collections of b...
Terrence A. Brooks
SP
2007
IEEE
183views Security Privacy» more  SP 2007»
14 years 2 months ago
Ciphertext-Policy Attribute-Based Encryption
In several distributed systems a user should only be able to access data if a user posses a certain set of credentials or attributes. Currently, the only method for enforcing such...
John Bethencourt, Amit Sahai, Brent Waters
SIGMETRICS
1997
ACM
164views Hardware» more  SIGMETRICS 1997»
14 years 4 hour ago
File Server Scaling with Network-Attached Secure Disks
By providing direct data transfer between storage and client, network-attached storage devices have the potential to improve scalability for existing distributed file systems (by...
Garth A. Gibson, David Nagle, Khalil Amiri, Fay W....
KDD
2002
ACM
214views Data Mining» more  KDD 2002»
14 years 8 months ago
Privacy preserving association rule mining in vertically partitioned data
Privacy considerations often constrain data mining projects. This paper addresses the problem of association rule mining where transactions are distributed across sources. Each si...
Jaideep Vaidya, Chris Clifton
ICDE
2008
IEEE
141views Database» more  ICDE 2008»
14 years 2 months ago
Provenance-aware secure networks
Network accountability and forensic analysis have become increasingly important, as a means of performing network diagnostics, identifying malicious nodes, enforcing trust managem...
Wenchao Zhou, Eric Cronin, Boon Thau Loo