Sciweavers

1440 search results - page 2 / 288
» Third-Party Flow Control
Sort
View
ASPLOS
2008
ACM
13 years 7 months ago
Dispersing proprietary applications as benchmarks through code mutation
Industry vendors hesitate to disseminate proprietary applications to academia and third party vendors. By consequence, the benchmarking process is typically driven by standardized...
Luk Van Ertvelde, Lieven Eeckhout
ENTCS
2007
102views more  ENTCS 2007»
13 years 5 months ago
Selective Data Encryption in Outsourced Dynamic Environments
The amount of information held by organizations’ databases is increasing very quickly. A recently proposed solution to the problem of data management, which is becoming increasi...
Ernesto Damiani, Sabrina De Capitani di Vimercati,...
DDECS
2007
IEEE
80views Hardware» more  DDECS 2007»
13 years 12 months ago
Design Platform for Quick Integration of an Internet Connectivity into System-on-Chips
— The paper describes pre-integrated subsystem consisting of a configurable 8-bit microcontroller and an Internet connection solution. The latter integrates Ethernet Media Access...
Bartosz Wojciechowski, Tomasz Kowalczyk, Wojciech ...
ICDE
2005
IEEE
100views Database» more  ICDE 2005»
14 years 7 months ago
Configurable Security Protocols for Multi-party Data Analysis with Malicious Participants
Standard multi-party computation models assume semi-honest behavior, where the majority of participants implement protocols according to specification, an assumption not always pl...
Bradley Malin, Edoardo Airoldi, Samuel Edoho-Eket,...
SISW
2005
IEEE
13 years 11 months ago
The Consequences of Decentralized Security in a Cooperative Storage System
Traditional storage systems have considered security as a problem to be solved at the perimeter: once a user is authenticated, each device internal to the system trusts the decisi...
Douglas Thain, Christopher Moretti, Paul Madrid, P...