Sciweavers

2001 search results - page 90 / 401
» A security architecture for data privacy and security
Sort
View
ACSAC
2010
IEEE
14 years 10 months ago
Paranoid Android: versatile protection for smartphones
Smartphone usage has been continuously increasing in recent years. Moreover, smartphones are often used for privacysensitive tasks, becoming highly valuable targets for attackers....
Georgios Portokalidis, Philip Homburg, Kostas Anag...
PET
2009
Springer
15 years 6 months ago
Privacy-Preserving Computation and Verification of Aggregate Queries on Outsourced Databases
: © Privacy-Preserving Computation and Verification of Aggregate Queries on Outsourced Databases Brian Thompson, Stuart Haber, William G. Horne, Tomas Sander, Danfeng Yao HP Labor...
Brian Thompson, Stuart Haber, William G. Horne, To...
CCS
2008
ACM
15 years 1 months ago
Mechanisms for usage control
Usage control is a generalization of access control that also addresses how data is used after it is released. We present a formal model for different mechanisms that can enforce ...
Alexander Pretschner, Manuel Hilty, David A. Basin...
CCS
2008
ACM
15 years 1 months ago
Rootkit-resistant disks
Rootkits are now prevalent in the wild. Users affected by rootkits are subject to the abuse of their data and resources, often unknowingly. Such malware becomes even more dangerou...
Kevin R. B. Butler, Stephen E. McLaughlin, Patrick...
GIL
2009
14 years 9 months ago
The Need for Content-lists, Dictionaries and Ontologies in Expressing and Evaluating Compliance to Crop-production Regulations,
: Regulations and standards are playing an increasingly important role in crop production. Common to the vast majority of these is that they are written in a natural language which...
Edward Nash