Sciweavers

32 search results - page 5 / 7
» Chip-Secured Data Access: Confidential Data on Untrusted Ser...
Sort
View
IACR
2011
127views more  IACR 2011»
12 years 5 months ago
Oblivious RAM with O((log N)^3) Worst-Case Cost
Oblivious RAM (O-RAM) is a useful primitive that allows a client to hide its data access patterns from an untrusted server in storage outsourcing applications. This paper proposes...
Elaine Shi, T.-H. Hubert Chan, Emil Stefanov, Ming...
ICDE
2006
IEEE
104views Database» more  ICDE 2006»
14 years 1 days ago
Trusted CVS
The CVS (Concurrent Versions System) software is a popular method for recording modifications to data objects, in addition to concurrent access to data in a multi-user environmen...
Muthuramakrishnan Venkitasubramaniam, Ashwin Macha...
IJCMAM
2010
160views more  IJCMAM 2010»
13 years 3 months ago
Exploring Type-and-Identity-Based Proxy Re-Encryption Scheme to Securely Manage Personal Health Records
Commercial Web-based Personal-Health Record (PHR) systems can help patients to share their personal health records (PHRs) anytime from anywhere. PHRs are very sensitive data and an...
Luan Ibraimi, Qiang Tang, Pieter H. Hartel, Willem...
ASPLOS
2000
ACM
13 years 10 months ago
OceanStore: An Architecture for Global-Scale Persistent Storage
OceanStore is a utility infrastructure designed to span the globe and provide continuous access to persistent information. Since this infrastructure is comprised of untrusted serv...
John Kubiatowicz, David Bindel, Yan Chen, Steven E...
CCS
2000
ACM
13 years 10 months ago
XML document security based on provisional authorization
The extensible markup language (XML) is a promising standard for describing semi-structured information and contents on the Internet. When XML comes to be a widespread data encodi...
Michiharu Kudo, Satoshi Hada