Sciweavers

IJNSEC
2006
89views more  IJNSEC 2006»
13 years 4 months ago
Mitigation of Insider Risks using Distributed Agent Detection, Filtering, and Signaling
An insider-robust approach to file integrity verification is developed using interacting strata of mobile agents. Previous approaches relied upon monolithic architectures, or more...
Adam J. Rocke, Ronald F. DeMara
CSE
2009
IEEE
13 years 5 months ago
Integrity Verification of Outsourced XML Databases
Recent years have witnessed an increasing trend of enterprises outsource their IT services to third parties. A major concern in database outsourcing paradigm is integrity verificat...
Ruilin Liu, Hui Wang