Sciweavers

DEXAW
2006
IEEE
151views Database» more  DEXAW 2006»
13 years 10 months ago
Avenues to Flexible Data Integrity Checking
Traditional methods for integrity checking in relational or deductive databases heavily rely on the assumption that data have integrity before the execution of updates. In this wa...
Hendrik Decker, Davide Martinenghi
FGCN
2007
IEEE
111views Communications» more  FGCN 2007»
13 years 10 months ago
Consistency Issue on Live Systems Forensics
Volatile data, being vital to digital investigation, have become part of the standard items targeted in the course of live response to a computer system. In traditional computer f...
Frank Y. W. Law, K. P. Chow, Michael Y. K. Kwan, P...
ACSAC
2007
IEEE
13 years 10 months ago
Establishing and Sustaining System Integrity via Root of Trust Installation
Integrity measurements provide a means by which distributed systems can assess the trustability of potentially compromised remote hosts. However, current measurement techniques si...
Luke St. Clair, Joshua Schiffman, Trent Jaeger, Pa...
IEEEARES
2008
IEEE
13 years 10 months ago
Application-Oriented Trust in Distributed Computing
Preserving integrity of applications being executed in remote machines is an open problem. Integrity requires that application code is not tampered with, prior to or during execut...
Riccardo Scandariato, Yoram Ofek, Paolo Falcarin, ...