Sciweavers

62 search results - page 8 / 13
» Security vs Performance: Tradeoffs using a Trust Framework
Sort
View
JUCS
2010
124views more  JUCS 2010»
13 years 6 months ago
Performance Optimizations for DAA Signatures on Java enabled Platforms
: With the spreading of embedded and mobile devices, public-key cryptography has become an important feature for securing communication and protecting personal data. However, the c...
Kurt Dietrich, Franz Röck
SRDS
2003
IEEE
14 years 27 days ago
Pesto Flavoured Security
We demonstrate that symmetric-key cryptography can be used for both read and write access control. One-time write access can be granted by handing over an encryption key, and our ...
Feike W. Dillema, Tage Stabell-Kulø
SIGMOD
2010
ACM
227views Database» more  SIGMOD 2010»
14 years 13 days ago
SecureBlox: customizable secure distributed data processing
We present SecureBlox, a declarative system that uniļ¬es a distributed query processor with a security policy framework. SecureBlox decouples security concerns from system speciļ...
William R. Marczak, Shan Shan Huang, Martin Braven...
ECCV
2010
Springer
13 years 12 months ago
Efficiently Scaling Up Video Annotation with Crowdsourced Marketplaces
Accurately annotating entities in video is labor intensive and expensive. As the quantity of online video grows, traditional solutions to this task are unable to scale to meet the ...
AINA
2011
IEEE
12 years 11 months ago
Auctions for Secure Multi-party Policy Negotiation in Ambient Intelligence
ā€”The advent of distributed and ad-hoc-connected systems such as in Ambient Intelligence applications confronts developers with the question on how to specify QoS- and security po...
Julian Schütte, Stephan Heuser