Sciweavers

3122 search results - page 144 / 625
» Storing Semistructured Data with STORED
Sort
View
ACNS
2004
Springer
220views Cryptology» more  ACNS 2004»
14 years 3 months ago
Secure Conjunctive Keyword Search over Encrypted Data
Abstract. We study the setting in which a user stores encrypted documents (e.g. e-mails) on an untrusted server. In order to retrieve documents satisfying a certain search criterio...
Philippe Golle, Jessica Staddon, Brent R. Waters
FSTTCS
2007
Springer
14 years 4 months ago
Computationally Sound Typing for Non-interference: The Case of Deterministic Encryption
Type systems for secure information flow aim to prevent a program from leaking information from variables that hold secret data to variables that hold public data. In this work we...
Judicaël Courant, Cristian Ene, Yassine Lakhn...
ICPPW
2006
IEEE
14 years 4 months ago
A Hybrid XML-Relational Grid Metadata Catalog
The ability to manage metadata is a critical requirement of the grid, but scientists have not been given the tools needed to catalog experimental data based complex metadata attri...
Scott Jensen, Beth Plale, Sangmi Lee Pallickara, Y...
ERLANG
2006
ACM
14 years 4 months ago
Concurrent caching
A concurrent cache design is presented which allows cached data to be spread across a cluster of computers. The implementation s persistent storage from cache storage and abstract...
Jay Nelson
UM
2005
Springer
14 years 3 months ago
Temporal Blurring: A Privacy Model for OMS Users
Stereotypes and clustering are some techniques for creating user models from user behavior. Yet, they possess important risks as users actions could be misinterpreted or users coul...
Rosa Alarcón, Luis A. Guerrero, José...