Sciweavers

859 search results - page 83 / 172
» Security for Key Management Interfaces
Sort
View
EDBT
2004
ACM
108views Database» more  EDBT 2004»
14 years 10 months ago
A Framework for Efficient Storage Security in RDBMS
Abstract. With the widespread use of e-business coupled with the public's awareness of data privacy issues and recent database security related legislations, incorporating sec...
Balakrishna R. Iyer, Sharad Mehrotra, Einar Myklet...
WETICE
2002
IEEE
14 years 2 months ago
On Communication Security in Wireless Ad-Hoc Sensor Networks
Networks of wireless microsensors for monitoring physical environments have emerged as an important new application area for the wireless technology. Key attributes of these new t...
Sasha Slijepcevic, Miodrag Potkonjak, Vlasios Tsia...
DISCEX
2003
IEEE
14 years 3 months ago
Monterey Security Enhanced Architecture Project
This research project has produced an innovative architecture and corrresponding engineering prototype consisting of trusted security services and integrated operating system mech...
Cynthia E. Irvine, David J. Shifflett, Paul C. Cla...
SIGUCCS
2005
ACM
14 years 3 months ago
Imaging, security, configuration, and maintenance for the masses
Educational Partnerships and Learning Technologies (EPLT) [1] at the University of Washington maintains and supports a fleet of approximately 1,000 general-access student computin...
Brandon Koeller, Karalee Woody
GRAPHICSINTERFACE
2004
13 years 11 months ago
Revisiting Display Space Management: Understanding Current Practice to Inform Next-generation Design
Most modern computer systems allow the user to control the space allocated to interfaces through a window system. While much of the understanding of how people interact with windo...
Dugald Ralph Hutchings, John T. Stasko