Sciweavers

379 search results - page 69 / 76
» The Need for Declarative Security Mechanisms
Sort
View
FC
2005
Springer
97views Cryptology» more  FC 2005»
14 years 27 days ago
Probabilistic Escrow of Financial Transactions with Cumulative Threshold Disclosure
Abstract. We propose a scheme for privacy-preserving escrow of financial transactions. The objective of the scheme is to preserve privacy and anonymity of the individual user enga...
Stanislaw Jarecki, Vitaly Shmatikov
VLDB
2005
ACM
151views Database» more  VLDB 2005»
14 years 25 days ago
Query Execution Assurance for Outsourced Databases
In this paper we propose and analyze a method for proofs of actual query execution in an outsourced database framework, in which a client outsources its data management needs to a...
Radu Sion
SC
2004
ACM
14 years 24 days ago
VMPlants: Providing and Managing Virtual Machine Execution Environments for Grid Computing
Virtual machines provide flexible, powerful execution environments for Grid computing, offering isolation and security mechanisms complementary to operating systems, customization...
Ivan Krsul, Arijit Ganguly, Jian Zhang, José...
ATAL
2004
Springer
14 years 23 days ago
Intelligent Agents Meet Semantic Web in a Smart Meeting Room
We describe a new smart meeting room system called EasyMeeting that explores the use of FIPA agent technologies, Semantic Web ontologies, logic reasoning, and security and privacy...
Harry Chen, Filip Perich, Dipanjan Chakraborty, Ti...
ICDCS
2003
IEEE
14 years 20 days ago
Cross-Feature Analysis for Detecting Ad-Hoc Routing Anomalies
With the proliferation of wireless devices, mobile ad hoc networking (MANET) has become a very exciting and important technology due to its characteristics of open medium and dyna...
Yi-an Huang, Wei Fan, Wenke Lee, Philip S. Yu