Sciweavers

107 search results - page 16 / 22
» Security in the cloud
Sort
View
ICDM
2009
IEEE
124views Data Mining» more  ICDM 2009»
14 years 3 months ago
On the (In)Security and (Im)Practicality of Outsourcing Precise Association Rule Mining
—The recent interest in outsourcing IT services onto the cloud raises two main concerns: security and cost. One task that could be outsourced is data mining. In VLDB 2007, Wong e...
Ian Molloy, Ninghui Li, Tiancheng Li
SIGCOMM
2012
ACM
11 years 11 months ago
Signposts: end-to-end networking in a world of middleboxes
This demo presents Signposts, a system to provide users with a secure, simple mechanism to establish and maintain communication channels between their personal cloud of named devi...
Amir Chaudhry, Anil Madhavapeddy, Charalampos Rots...
RAID
2010
Springer
13 years 7 months ago
HyperCheck: A Hardware-Assisted Integrity Monitor
Abstract. Over the past few years, virtualization has been employed to environments ranging from densely populated cloud computing clusters to home desktop computers. Security rese...
Jiang Wang, Angelos Stavrou, Anup K. Ghosh
FCSC
2010
92views more  FCSC 2010»
13 years 7 months ago
TRainbow: a new trusted virtual machine based platform
Currently, with the evolution of virtualization technology, cloud computing mode has become more and more popular. However, people still concern the issues of the runtime integrity...
Yuzhong Sun, Haifeng Fang, Ying Song, Lei Du, Kai ...
IACR
2011
158views more  IACR 2011»
12 years 8 months ago
Can Homomorphic Encryption be Practical?
Abstract. The prospect of outsourcing an increasing amount of data storage and management to cloud services raises many new privacy concerns for individuals and businesses alike. T...
Kristin Lauter, Michael Naehrig, Vinod Vaikuntanat...