Sciweavers

IEEESCC
2005
IEEE
14 years 6 months ago
A Framework for Failure Impact Analysis and Recovery with Respect to Service Level Agreements
In today’s IT service market customers urge providers to grant guarantees for quality of service (QoS) which are laid down in Service Level Agreements (SLAs). To satisfy custome...
Andreas Hanemann, David Schmitz, Martin Sailer
NSPW
2006
ACM
14 years 6 months ago
Googling considered harmful
Virtually every Internet user on the planet uses the powerful free tools offered by a handful of information service providers in many aspects of their personal and professional l...
Gregory J. Conti
WECWIS
2006
IEEE
87views ECommerce» more  WECWIS 2006»
14 years 6 months ago
SLA Automated Negotiation Manager for Computing Services
Success in today’s marketing arena can often depend on companies embracing effective new technologies and integrating them into their business model. In the computing service su...
Halina Kaminski, Mark Perry
TRIDENTCOM
2006
IEEE
14 years 6 months ago
Barcelona's open access network testbed
Abstract— This paper describes the implementation and deployment of a novel architecture for a metropolitan open wireless access network, shared among different service providers...
Jaume Barceló, Carlos Macián, Jorge ...
IDEAS
2006
IEEE
152views Database» more  IDEAS 2006»
14 years 6 months ago
Querying Encrypted XML Documents
This paper proposes techniques to query encrypted XML documents. Such a problem predominantly occurs in “Database as a Service” (DAS) architectures, where a client may outsour...
Ravi Chandra Jammalamadaka, Sharad Mehrotra
GLOBECOM
2006
IEEE
14 years 6 months ago
Resource Optimization Subject to a Percentile Response Time SLA for Enterprise Computing
— We consider a set of computer resources used by a service provider to host enterprise applications subject to service level agreements. We present an approach for resource opti...
Kaiqi Xiong, Harry G. Perros
DASFAA
2006
IEEE
134views Database» more  DASFAA 2006»
14 years 6 months ago
Authentication of Outsourced Databases Using Signature Aggregation and Chaining
Database outsourcing is an important emerging trend which involves data owners delegating their data management needs to an external service provider. Since a service provider is a...
Maithili Narasimha, Gene Tsudik
VLDB
2007
ACM
111views Database» more  VLDB 2007»
14 years 6 months ago
Security in Outsourcing of Association Rule Mining
Outsourcing association rule mining to an outside service provider brings several important benefits to the data owner. These include (i) relief from the high mining cost, (ii) m...
Wai Kit Wong, David W. Cheung, Edward Hung, Ben Ka...
PET
2007
Springer
14 years 6 months ago
Louis, Lester and Pierre: Three Protocols for Location Privacy
Abstract. Location privacy is of utmost concern for location-based services. It is the property that a person’s location is revealed to other entities, such as a service provider...
Ge Zhong, Ian Goldberg, Urs Hengartner
MIDDLEWARE
2007
Springer
14 years 6 months ago
Middleware support for protecting personal data from web based data services
Web based data services are very popular with the average computer user. Examples of such services include Gmail.com, Yahoo Photos, Yahoo Briefcase and Amazon S3 Service. In such ...
Ravi Chandra Jammalamadaka