Sciweavers

3418 search results - page 507 / 684
» Security for Grid Services
Sort
View
CSFW
1995
IEEE
14 years 1 months ago
Implementation of a discretionary access control model for script-based systems
Powerful applications can be implemented using command scripts. A command script is a program written by one user, called a writer, and made available to another user, called the ...
Trent Jaeger, Atul Prakash
DBSEC
2007
128views Database» more  DBSEC 2007»
13 years 11 months ago
gVault: A Gmail Based Cryptographic Network File System
Abstract. In this paper, we present the design of gVault, a cryptographic network file system that utilizes the data storage provided by Gmail’s web-based email service. Such a ...
Ravi Chandra Jammalamadaka, Roberto Gamboni, Shara...
SIGCOMM
2010
ACM
13 years 10 months ago
Empowering users against sidejacking attacks
SideJacking occurs when an attacker intercepts a session cookie and uses it to impersonate a user and gain unauthorized access to a web-based service. To prevent SideJacking, a se...
Ryan D. Riley, Nada Mohammed Ali, Kholoud Saleh Al...
CCS
2010
ACM
13 years 9 months ago
Protecting location privacy against inference attacks
GPS-enabled mobile devices are a quickly growing market and users are starting to share their location information with each other through services such as Google Latitude. Locati...
Kazuhiro Minami, Nikita Borisov
ITIIS
2010
128views more  ITIIS 2010»
13 years 8 months ago
Semi-trusted Collaborative Framework for Multi-party Computation
Data sharing is an essential process for collaborative works particularly in the banking, finance and healthcare industries. These industries require many collaborative works with...
Kok Seng Wong, Myung Ho Kim