Sciweavers

653 search results - page 42 / 131
» Security Architecture for Federated Cooperative Information ...
Sort
View
NSPW
2004
ACM
14 years 1 months ago
Support for multi-level security policies in DRM architectures
Digital rights management systems allow copyrighted content to be commercialized in digital format without the risk of revenue loss due to piracy. Making such systems secure is no...
Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenba...
ISCA
2008
IEEE
185views Hardware» more  ISCA 2008»
13 years 7 months ago
From Speculation to Security: Practical and Efficient Information Flow Tracking Using Speculative Hardware
Dynamic information flow tracking (also known as taint tracking) is an appealing approach to combat various security attacks. However, the performance of applications can severely...
Haibo Chen, Xi Wu, Liwei Yuan, Binyu Zang, Pen-Chu...
STORAGESS
2005
ACM
14 years 1 months ago
The evolution of storage service providers: techniques and challenges to outsourcing storage
As enterprise storage needs grow, it is challenging to manage storage systems. The costs of locally managing, supporting, and maintaining resilience in storage systems has skyrock...
Ragib Hasan, William Yurcik, Suvda Myagmar
DEXAW
1999
IEEE
75views Database» more  DEXAW 1999»
14 years 2 days ago
Coordination of Security Levels for Internet Architectures
Internet systems provide a variety of ways to exchange information, contain large amounts and variety of data, and have become quite complex, making them vulnerable to attacks fro...
Eduardo B. Fernández
INFOCOM
2012
IEEE
11 years 10 months ago
Phantom: Physical layer cooperation for location privacy protection
—Localization techniques that allow inferring the location of wireless devices directly from received signals have exposed mobile users to new threats. Adversaries can easily col...
Sangho Oh, Tam Vu, Marco Gruteser, Suman Banerjee