Sciweavers

231 search results - page 26 / 47
» Working set-based access control for network file systems
Sort
View
NDSS
2005
IEEE
14 years 2 months ago
Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage
In 1998, Blaze, Bleumer, and Strauss proposed an application called atomic proxy re-encryption, in which a semi-trusted proxy converts a ciphertext for Alice into a ciphertext for...
Giuseppe Ateniese, Kevin Fu, Matthew Green, Susan ...
FAST
2003
13 years 10 months ago
Block-Level Security for Network-Attached Disks
We propose a practical and efficient method for adding security to network-attached disks (NADs). In contrast to previous work, our design requires no changes to the data layout ...
Marcos Kawazoe Aguilera, Minwen Ji, Mark Lillibrid...
TON
2010
161views more  TON 2010»
13 years 3 months ago
Investigating Self-Similarity and Heavy-Tailed Distributions on a Large-Scale Experimental Facility
Abstract--After the seminal work by Taqqu et al. relating selfsimilarity to heavy-tailed distributions, a number of research articles verified that aggregated Internet traffic time...
Patrick Loiseau, Paulo Gonçalves, Guillaume...
JSAC
2007
130views more  JSAC 2007»
13 years 8 months ago
Cross-layer QoS Analysis of Opportunistic OFDM-TDMA and OFDMA Networks
Abstract— Performance analysis of multiuser orthogonal frequency division multiplexing (OFDM-TDMA) and orthogonal frequency division multiple access (OFDMA) networks in support o...
Yu-Jung Chang, Feng-Tsun Chien, C. C. Jay Kuo
ICN
2005
Springer
14 years 2 months ago
MiSC: A New Availability Remote Storage System for Mobile Appliance
Abstract. The continued growth of both mobile appliances and wireless Internet technologies is bringing a new telecommunication revolution and has extended the demand of various se...
Joo-Ho Kim, Bo-Seok Moon, Myong-Soon Park