Sciweavers

1323 search results - page 141 / 265
» Updatable Security Views
Sort
View
114
Voted
ESCIENCE
2006
IEEE
15 years 8 months ago
Building Simple, Easy-to-Use Grids with Styx Grid Services and SSH
Grid systems have a reputation for being difficult to build and use. We describe how the ease of use of the Styx Grid Services (SGS) software can be combined with the security and...
J. D. Blower, K. Haines
144
Voted
EUROSEC
2010
ACM
15 years 8 months ago
Practical protection for personal storage in the cloud
We present a storage management framework for Web 2.0 services that places users back in control of their data. Current Web services complicate data management due to data lock-in...
Neal H. Walfield, Paul T. Stanton, John Linwood Gr...
117
Voted
CTRSA
2006
Springer
160views Cryptology» more  CTRSA 2006»
15 years 6 months ago
RFID-Tags for Anti-counterfeiting
RFID-tags are becoming very popular tools for identification of products. As they have a small microchip on board, they offer functionality that can be used for security purposes. ...
Pim Tuyls, Lejla Batina
117
Voted
ITIIS
2010
128views more  ITIIS 2010»
15 years 1 months ago
Semi-trusted Collaborative Framework for Multi-party Computation
Data sharing is an essential process for collaborative works particularly in the banking, finance and healthcare industries. These industries require many collaborative works with...
Kok Seng Wong, Myung Ho Kim

Tutorial
905views
17 years 2 months ago
Location-aware Query Processing and Optimization
The wide spread use of cellular phones, handheld devices, and GPS-like technology enables location-aware environments where virtually all objects are aware of their locations. Loca...