Sciweavers

1347 search results - page 58 / 270
» Towards a Secure Data Stream Management System
Sort
View
CCS
2010
ACM
13 years 11 months ago
Data protection in outsourcing scenarios: issues and directions
Data outsourcing is an emerging paradigm that allows users and companies to give their (potentially sensitive) data to external servers that then become responsible for their stor...
Pierangela Samarati, Sabrina De Capitani di Vimerc...
IDA
2010
Springer
13 years 9 months ago
Data Mining for Modeling Chiller Systems in Data Centers
We present a data mining approach to model the cooling infrastructure in data centers, particularly the chiller ensemble. These infrastructures are poorly understood due to the lac...
Debprakash Patnaik, Manish Marwah, Ratnesh K. Shar...
RAID
2009
Springer
14 years 2 months ago
Autonomic Intrusion Detection System
Abstract. We propose a novel framework of autonomic intrusion detection that fulfills online and adaptive intrusion detection in unlabeled audit data streams. The framework owns a...
Wei Wang 0012, Thomas Guyet, Svein J. Knapskog
WIMOB
2007
IEEE
14 years 1 months ago
Analysis of Group Key Management Protocols for Secure Multicasting in Vehicular Software Distribution Network
—In this paper we investigate the issues in designing key management architecture for secure multicasting in remote software distribution to advance vehicles. We consider the Veh...
Irina Hossain, Syed Masud Mahmud
OOPSLA
2009
Springer
14 years 2 months ago
Dependable, online upgrades in enterprise systems
Software upgrades are unreliable, often causing downtime or data loss. I propose Imago, an approach for removing the leading causes of upgrade failures (broken dependencies) and o...
Tudor Dumitras