Sciweavers

15 search results - page 3 / 3
» Countering Trusting Trust through Diverse Double-Compiling
Sort
View
FC
2007
Springer
117views Cryptology» more  FC 2007»
13 years 12 months ago
Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer
Keylogging and phishing attacks can extract user identity and sensitive account information for unauthorized access to users’ financial accounts. Most existing or proposed solut...
Mohammad Mannan, Paul C. van Oorschot
ICDE
2008
IEEE
141views Database» more  ICDE 2008»
14 years 6 days ago
Provenance-aware secure networks
Network accountability and forensic analysis have become increasingly important, as a means of performing network diagnostics, identifying malicious nodes, enforcing trust managem...
Wenchao Zhou, Eric Cronin, Boon Thau Loo
CCGRID
2006
IEEE
13 years 12 months ago
QoS Oriented Resource Reservation in Shared Environments
Resource sharing across different computers and organizations makes it possible to support diverse, dynamic changing resource requirements of distributed applications. Reservation...
Ming Wu, Xian-He Sun, Yong Chen
ICDE
2009
IEEE
255views Database» more  ICDE 2009»
14 years 7 months ago
Database Management as a Service: Challenges and Opportunities
Data outsourcing or database as a service is a new paradigm for data management in which a third party service provider hosts a database as a service. The service provides data man...
Ahmed Metwally, Amr El Abbadi, Divyakant Agrawal, ...
KDD
2008
ACM
199views Data Mining» more  KDD 2008»
14 years 6 months ago
Efficient computation of personal aggregate queries on blogs
There is an exploding amount of user-generated content on the Web due to the emergence of "Web 2.0" services, such as Blogger, MySpace, Flickr, and del.icio.us. The part...
Ka Cheung Sia, Junghoo Cho, Yun Chi, Belle L. Tsen...