Sciweavers

393 search results - page 77 / 79
» Securing Grid Data Using Mandatory Access Controls
Sort
View
DRM
2005
Springer
13 years 11 months ago
Fairer usage contracts for DRM
DRM has been widely promoted as a means to enforce copyright. In many previous papers, it has been argued that DRM gives too much power to rights holders and actually goes beyond ...
Alapan Arnab, Andrew Hutchison
SOSP
2005
ACM
14 years 2 months ago
The taser intrusion recovery system
Recovery from intrusions is typically a very time-consuming operation in current systems. At a time when the cost of human resources dominates the cost of computing resources, we ...
Ashvin Goel, Kenneth Po, Kamran Farhadi, Zheng Li,...
WSE
2002
IEEE
13 years 10 months ago
Laying the Foundation for Web Services over Legacy Systems
As the use of the World Wide Web becomes more pervasive within our society, businesses and institutions are required to migrate a wide range of services to the web. Difficulties a...
Janet Lavery, Cornelia Boldyreff, Bin Ling, Colin ...
IACR
2011
86views more  IACR 2011»
12 years 5 months ago
Protecting Drive Encryption Systems Against Memory Attacks
Software drive encryption systems are vulnerable to memory attacks, in which an attacker gains physical accesses to the unattended computer, obtains the decryption keys from memor...
Leo Dorrendorf
VLDB
1997
ACM
120views Database» more  VLDB 1997»
13 years 10 months ago
A Region Splitting Strategy for Physical Database Design of Multidimensional File Organizations
This paper presents a region splitting strategy for physical database design of multidimensional le organizations. Physical database design is the process of determining the optim...
Jong-Hak Lee, Young-Koo Lee, Kyu-Young Whang, Il-Y...