Sciweavers

IACR
2011
120views more  IACR 2011»
12 years 4 months ago
McOE: A Foolproof On-Line Authenticated Encryption Scheme
On-Line Authenticated Encryption (OAE) combines confidentiality with data integrity and is on-line computable. Most block cipher-based schemes for Authenticated Encryption can be ...
Ewan Fleischmann, Christian Forler, Stefan Lucks
GPC
2009
Springer
13 years 2 months ago
Integrity Assurance Technique Using Determinant Approach
Data integrity is an important aspect of storage security and reliability which are prerequisite for most computer systems and network applications. This paper proposes a new tech...
Jasim A. Ghaeb
SP
1987
IEEE
118views Security Privacy» more  SP 1987»
13 years 8 months ago
A Comparison of Commercial and Military Computer Security Policies
Most discussions of computer security focus on control of disclosure. In Particular, the U.S. Department of Defense has developed a set of criteria for computer mechanisms to prov...
D. D. Clark, D. R. Wilson
SRDS
1999
IEEE
13 years 8 months ago
On the Provision of Replicated Internet Auction Services
The paper presents the design of a software infrastructure that can support negotiation and competition among buyers and sellers of goods (auctioning) over the Internet. The goals...
Fabio Panzieri, Santosh K. Shrivastava
PRDC
1999
IEEE
13 years 8 months ago
Experimental Assessment of COTS DBMS Robustness under Transient Faults
This paper evaluates the behavior of a common off-theshelf (COTS) database management system (DBMS) in presence of transient faults. Database applications have traditionally been ...
Diamantino Costa, Henrique Madeira
VTS
2000
IEEE
95views Hardware» more  VTS 2000»
13 years 9 months ago
Word Voter: A New Voter Design for Triple Modular Redundant Systems
Redundancy techniques are commonly used to design dependable systems to ensure high reliability, availability and data integrity. Triple Modular Redundancy (TMR) is a widely used ...
Subhasish Mitra, Edward J. McCluskey
ITC
2000
IEEE
123views Hardware» more  ITC 2000»
13 years 9 months ago
Combinational logic synthesis for diversity in duplex systems
We describe logic synthesis techniques for designing diverse implementations of combinational logic circuits in order to maximize the data integrity of diverse duplex systems in t...
Subhasish Mitra, Edward J. McCluskey
DSN
2003
IEEE
13 years 9 months ago
ICR: In-Cache Replication for Enhancing Data Cache Reliability
Processor caches already play a critical role in the performance of today’s computer systems. At the same time, the data integrity of words coming out of the caches can have ser...
Wei Zhang 0002, Sudhanva Gurumurthi, Mahmut T. Kan...
AMAST
2004
Springer
13 years 10 months ago
On Guard: Producing Run-Time Checks from Integrity Constraints
Abstract. Software applications are inevitably concerned with data integrity, whether the data is stored in a database, files, or program memory. An integrity guard is code execut...
Michael Benedikt, Glenn Bruns
IRI
2006
IEEE
13 years 10 months ago
An RDF-based annotation framework for providing web resources integrity
: Data integrity of web resources is becoming more and more important with the increasing development of Internet. In the context of active intermediaries, current solution for dat...
Dejun Jiang, Chi-Hung Chi, Lin Liu