Sciweavers

859 search results - page 110 / 172
» Security for Key Management Interfaces
Sort
View
139
Voted
DBSEC
2008
196views Database» more  DBSEC 2008»
15 years 4 months ago
Shared and Searchable Encrypted Data for Untrusted Servers
Current security mechanisms are not suitable for organisations that outsource their data management to untrusted servers. Encrypting and decrypting sensitive data at the client si...
Changyu Dong, Giovanni Russello, Naranker Dulay
147
Voted
SIGMOD
2011
ACM
204views Database» more  SIGMOD 2011»
14 years 5 months ago
Oracle database filesystem
Modern enterprise, web, and multimedia applications are generating unstructured content at unforeseen volumes in the form of documents, texts, and media files. Such content is gen...
Krishna Kunchithapadam, Wei Zhang, Amit Ganesh, Ni...
138
Voted
ECUMN
2007
Springer
15 years 8 months ago
Enforcing Access Control Using Risk Assessment
Context-based access control is an emerging approach for modeling adaptive solution, making access control management more flexible and powerful. But in the ubiquitous environment...
Nguyen Ngoc Diep, Le Xuan Hung, Yonil Zhung, Sungy...
156
Voted
HT
2006
ACM
15 years 8 months ago
Harvesting social knowledge from folksonomies
Collaborative tagging systems, or folksonomies, have the potential of becoming technological infrastructure to support knowledge management activities in an organization or a soci...
Harris Wu, Mohammad Zubair, Kurt Maly
125
Voted
IEEEPACT
2006
IEEE
15 years 8 months ago
Architectural support for operating system-driven CMP cache management
The role of the operating system (OS) in managing shared resources such as CPU time, memory, peripherals, and even energy is well motivated and understood [23]. Unfortunately, one...
Nauman Rafique, Won-Taek Lim, Mithuna Thottethodi