Sciweavers

26 search results - page 1 / 6
» Providing data confidentiality against malicious hosts in Sh...
Sort
View
SCP
2010
59views more  SCP 2010»
13 years 3 months ago
Providing data confidentiality against malicious hosts in Shared Data Spaces
Giovanni Russello, Changyu Dong, Naranker Dulay, M...
COORDINATION
2008
Springer
13 years 6 months ago
Encrypted Shared Data Spaces
Abstract. The deployment of Share Data Spaces in open, possibly hostile, environments arises the need of protecting the confidentiality of the data space content. Existing approach...
Giovanni Russello, Changyu Dong, Naranker Dulay, M...
HPCA
2008
IEEE
14 years 5 months ago
Single-level integrity and confidentiality protection for distributed shared memory multiprocessors
Multiprocessor computer systems are currently widely used in commercial settings to run critical applications. These applications often operate on sensitive data such as customer ...
Brian Rogers, Chenyu Yan, Siddhartha Chhabra, Milo...
MASS
2010
156views Communications» more  MASS 2010»
13 years 2 months ago
On application of Host Identity Protocol in wireless sensor networks
Recent advances in development of low-cost wireless sensor platforms open up opportunities for novel wireless sensor network (WSN) applications. Likewise emerge security concerns o...
Andrey Khurri, Dmitriy Kuptsov, Andrei Gurtov
CCS
2010
ACM
13 years 5 months ago
Hierarchical attribute-based encryption for fine-grained access control in cloud storage services
Cloud computing, as an emerging computing paradigm, enables users to remotely store their data into a cloud so as to enjoy scalable services on-demand. Especially for small and me...
Guojun Wang, Qin Liu, Jie Wu