Sciweavers

325 search results - page 2 / 65
» Patterns for Secure Boot and Secure Storage in Computer Syst...
Sort
View
PERVASIVE
2007
Springer
13 years 3 months ago
Securing Pocket Hard Drives
Inexpensive portable storage devices that are available in the market today have made it easier for users to carry data and programs with them and borrow computing platforms when ...
Nishkam Ravi, Chandra Narayanaswami, Mandayam T. R...
CCS
2008
ACM
13 years 4 months ago
Building castles out of mud: practical access pattern privacy and correctness on untrusted storage
We introduce a new practical mechanism for remote data storage with efficient access pattern privacy and correctness. A storage client can deploy this mechanism to issue encrypted...
Peter Williams, Radu Sion, Bogdan Carbunar
IM
2003
13 years 5 months ago
Khnum - A Scalable Rapid Application Deployment System for Dynamic Hosting Infrastructures
: In a dynamically scalable hosting infrastructure for e-business computing, servers need to be quickly allocated in order to satisfy a sudden demand for increased computing power ...
Alain Azagury, Germán S. Goldszmidt, Yair K...
SOSP
2009
ACM
14 years 15 days ago
Fabric: a platform for secure distributed computation and storage
Fabric is a new system and language for building secure distributed information systems. It is a decentralized system that allows heterogeneous network nodes to securely share bot...
Jed Liu, Michael D. George, K. Vikram, Xin Qi, Luc...
CCS
2007
ACM
13 years 9 months ago
Uclinux: a linux security module for trusted-computing-based usage controls enforcement
Usage controls allow the distributor of some information to limit how recipients of that information may use it. The Trusted Computing Group has standardized Trusted Platform Modu...
David Kyle, José Carlos Brustoloni