Sciweavers

903 search results - page 2 / 181
» An Adaptive Privacy Management System for Data Repositories
Sort
View
CRYPTO
1987
Springer
87views Cryptology» more  CRYPTO 1987»
13 years 8 months ago
How to Make Replicated Data Secure
Many distributed systems manage some form of long-lived data, such as files or data bases. The performance and fault-tolerance of such systems may be enhanced if the repositories ...
Maurice Herlihy, J. D. Tygar
JCDL
2006
ACM
133views Education» more  JCDL 2006»
13 years 11 months ago
Repository software evaluation using the audit checklist for certification of trusted digital repositories
The NDIIPP ECHO DEPository project [1] digital repository evaluation will use an augmented version of the draft Audit Checklist for Certification of Trusted Digital Repositories (...
Joanne Kaczmarek, Thomas G. Habing, Janet Eke
USENIX
2000
13 years 6 months ago
Traffic Data Repository at the WIDE Project
It becomes increasingly important for both network researchers and operators to know the trend of network traffic and to find anomaly in their network traffic. This paper describe...
Kenjiro Cho, Koushirou Mitsuya, Akira Kato
PVLDB
2008
160views more  PVLDB 2008»
13 years 4 months ago
BayesStore: managing large, uncertain data repositories with probabilistic graphical models
Several real-world applications need to effectively manage and reason about large amounts of data that are inherently uncertain. For instance, pervasive computing applications mus...
Daisy Zhe Wang, Eirinaios Michelakis, Minos N. Gar...
CASSIS
2005
Springer
13 years 10 months ago
The Architecture of a Privacy-Aware Access Control Decision Component
Today many interactions are carried out online through Web sites and e-services and often private and/or sensitive information is required by service providers. A growing concern r...
Claudio Agostino Ardagna, Marco Cremonini, Ernesto...