Sciweavers

726 search results - page 87 / 146
» Securing XML data in third-party distribution systems
Sort
View
SRDS
2003
IEEE
14 years 1 months ago
Pesto Flavoured Security
We demonstrate that symmetric-key cryptography can be used for both read and write access control. One-time write access can be granted by handing over an encryption key, and our ...
Feike W. Dillema, Tage Stabell-Kulø
CW
2005
IEEE
14 years 1 months ago
A Capability-Based Transparent Cryptographic File System
Data on the file system in mobile internetworked working environments are exposed data to a number of threats ranging from physical theft of storage devices to industrial espiona...
Frank Graf, Stephen D. Wolthusen
NPC
2005
Springer
14 years 1 months ago
Globus Toolkit Version 4: Software for Service-Oriented Systems
The Globus Toolkit (GT) has been developed since the late 1990s to support the development of service-oriented distributed computing applications and infrastructures. Core GT compo...
Ian T. Foster
OOPSLA
2007
Springer
14 years 1 months ago
Democratizing the cloud
Programming distributed data-intensive web and mobile applications is gratuitously hard. As the world is moving more and more towards the software as services model, we have to co...
Erik Meijer
SIGMOD
2007
ACM
144views Database» more  SIGMOD 2007»
14 years 8 months ago
GhostDB: querying visible and hidden data without leaks
Imagine that you have been entrusted with private data, such as corporate product information, sensitive government information, or symptom and treatment information about hospita...
Nicolas Anciaux, Mehdi Benzine, Luc Bouganim, Phil...