Sciweavers

393 search results - page 17 / 79
» Security Architectures for Controlled Digital Information Di...
Sort
View
CCS
2010
ACM
13 years 11 months ago
Data protection in outsourcing scenarios: issues and directions
Data outsourcing is an emerging paradigm that allows users and companies to give their (potentially sensitive) data to external servers that then become responsible for their stor...
Pierangela Samarati, Sabrina De Capitani di Vimerc...
WINET
2002
138views more  WINET 2002»
13 years 7 months ago
An Architecture for Secure Wide-Area Service Discovery
Abstract. The widespread deployment of inexpensive communications technology, computational resources in the networking infrastructure, and network-enabled end devices poses an int...
Todd D. Hodes, Steven E. Czerwinski, Ben Y. Zhao, ...
HIPEAC
2005
Springer
14 years 27 days ago
Memory-Centric Security Architecture
Abstract. This paper presents a new security architecture for protecting software confidentiality and integrity. Different from the previous process-centric systems designed for ...
Weidong Shi, Chenghuai Lu, Hsien-Hsin S. Lee
JCDL
2006
ACM
116views Education» more  JCDL 2006»
14 years 1 months ago
Enabling exploration: travelers in the middle east archive
In this paper, we describe the Travelers in the Middle East Archive (TIMEA), a digital archive focused on Western explorations in the Middle East between the 18th and early 20th c...
Lisa M. Spiro, Marie Wise, Geneva L. Henry, Chuck ...
XMLSEC
2003
ACM
14 years 18 days ago
Access control of XML documents considering update operations
As a large quantity of information is presented in XML format on the Web, there are increasing demands for XML security. Until now, research on XML security has been focused on th...
Chung-Hwan Lim, Seog Park, Sang Hyuk Son