Sciweavers

68 search results - page 6 / 14
» The challenge of data and application security and privacy (...
Sort
View
FAST
2003
13 years 8 months ago
Data Staging on Untrusted Surrogates
We show how untrusted computers can be used to facilitate secure mobile data access. We discuss a novel architecture, data staging, that improves the performance of distributed ï¬...
Jason Flinn, Shafeeq Sinnamohideen, Niraj Tolia, M...
TRUSTBUS
2007
Springer
14 years 1 months ago
Usage Control in Service-Oriented Architectures
Usage control governs the handling of sensitive data after it has been given away. The enforcement of usage control requirements is a challenge because the service requester in gen...
Alexander Pretschner, Fabio Massacci, Manuel Hilty
CCGRID
2003
IEEE
14 years 24 days ago
Using grid technologies to face medical image analysis challenges
The availability of digital imagers inside hospitals and their ever growing inspection capabilities have established digital medical images as a key component of many pathologies ...
Johan Montagnat, Vincent Breton, Isabelle E. Magni...
ACSAC
2005
IEEE
14 years 1 months ago
mSSL: Extending SSL to Support Data Sharing Among Collaborative Clients
Client-server applications often do not scale well when a large number of clients access a single server. To solve this, a new trend is to allow a client to download data from oth...
Jun Li, Xun Kang
SIGMOD
2012
ACM
250views Database» more  SIGMOD 2012»
11 years 10 months ago
Authenticating location-based services without compromising location privacy
The popularity of mobile social networking services (mSNSs) is propelling more and more businesses, especially those in retailing and marketing, into mobile and location-based for...
Haibo Hu, Jianliang Xu, Qian Chen, Ziwei Yang