Sciweavers

107 search results - page 18 / 22
» Security in the cloud
Sort
View
120
Voted
WEBDB
2009
Springer
172views Database» more  WEBDB 2009»
15 years 10 months ago
PrivatePond: Outsourced Management of Web Corpuses
With the rise of cloud computing, it is increasingly attractive for end-users (organizations and individuals) to outsource the management of their data to a small number of larges...
Daniel Fabbri, Arnab Nandi, Kristen LeFevre, H. V....
119
Voted
IEEEARES
2010
IEEE
15 years 10 months ago
Program Obfuscation by Strong Cryptography
—Program obfuscation is often employed by malware in order to avoid detection by anti-virus software, but it has many other legitimate uses, such as copy protection, software lic...
Zeljko Vrba, Pål Halvorsen, Carsten Griwodz
177
Voted
SIGSOFT
2010
ACM
15 years 1 months ago
Multiplicity computing: a vision of software engineering for next-generation computing platform applications
New technologies have recently emerged to challenge the very nature of computing: multicore processors, virtualized operating systems and networks, and data-center clouds. One can...
Cristian Cadar, Peter Pietzuch, Alexander L. Wolf
118
Voted
HPCN
1999
Springer
15 years 8 months ago
Towards a Scalable Metacomputing Storage Service
We describe a prototypical storage service through which we are addressing some of the open storage issues in wide-area distributed high-performance computing. We discuss some of t...
Craig J. Patten, Kenneth A. Hawick, J. F. Hercus
156
Voted
PAISI
2010
Springer
15 years 1 months ago
Efficient Privacy Preserving K-Means Clustering
Abstract. This paper introduces an efficient privacy-preserving protocol for distributed K-means clustering over an arbitrary partitioned data, shared among N parties. Clustering i...
Maneesh Upmanyu, Anoop M. Namboodiri, Kannan Srina...