Sciweavers

TITS
2010
117views Education» more  TITS 2010»
12 years 11 months ago
Lane-Level Integrity Provision for Navigation and Map Matching With GNSS, Dead Reckoning, and Enhanced Maps
Lane-level positioning and map matching are some of the biggest challenges for navigation systems. Additionally, in safety applications or in those with critical performance requir...
Rafael Toledo-Moreo, David Bétaille, Fran&c...
ICISS
2010
Springer
13 years 1 months ago
Unifying Facets of Information Integrity
Abstract. Information integrity is a vital security property in a variety of applications. However, there is more than one facet to integrity: interpretations of integrity in diffe...
Arnar Birgisson, Alejandro Russo, Andrei Sabelfeld
DGO
2007
174views Education» more  DGO 2007»
13 years 6 months ago
New techniques for ensuring the long term integrity of digital archives
A large portion of the government, business, cultural, and scientific digital data being created today needs to be archived and preserved for future use of periods ranging from a ...
Sangchul Song, Joseph JáJá
FOIKS
2004
Springer
13 years 8 months ago
Simplification of Integrity Constraints for Data Integration
When two or more databases are combined into a global one, integrity may be violated even when each database is consistent with its own local integrity constraints. Efficient metho...
Henning Christiansen, Davide Martinenghi
ACSAC
2009
IEEE
13 years 8 months ago
Justifying Integrity Using a Virtual Machine Verifier
Emerging distributed computing architectures, such as grid and cloud computing, depend on the high integrity execution of each system in the computation. While integrity measuremen...
Joshua Schiffman, Thomas Moyer, Christopher Shal, ...
SP
1990
IEEE
13 years 8 months ago
Some Conundrums Concerning Separation of Duty
This paper examines some questions concerning commercial computer security integrity policies. We give an example of a dynamic separation of duty policy which cannot be implemente...
M. J. Nash, K. R. Poland
PERVASIVE
2004
Springer
13 years 10 months ago
eSeal - A System for Enhanced Electronic Assertion of Authenticity and Integrity
Ensuring authenticity and integrity are important tasks when dealing with goods. While in the past seal wax was used to ensure the integrity, electronic devices are now able to tak...
Christian Decker, Michael Beigl, Albert Krohn, Phi...
ASIAN
2005
Springer
103views Algorithms» more  ASIAN 2005»
13 years 10 months ago
Implementing a Tamper-Evident Database System
Abstract. Data integrity is an assurance that data has not been modified in an unknown or unauthorized manner. The goal of this paper is to allow a user to leverage a small amount...
Gerome Miklau, Dan Suciu
STORAGESS
2005
ACM
13 years 10 months ago
Ensuring data integrity in storage: techniques and applications
Data integrity is a fundamental aspect of storage security and reliability. With the advent of network storage and new technology trends that result in new failure modes for stora...
Gopalan Sivathanu, Charles P. Wright, Erez Zadok
SACMAT
2006
ACM
13 years 10 months ago
PRIMA: policy-reduced integrity measurement architecture
We propose an integrity measurement approach based on information flow integrity, which we call the Policy-Reduced Integrity Measurement Architecture (PRIMA). The recent availabi...
Trent Jaeger, Reiner Sailer, Umesh Shankar