Sciweavers

702 search results - page 64 / 141
» An overlay approach to data security in ad-hoc networks
Sort
View
CCR
2008
94views more  CCR 2008»
14 years 10 months ago
ECHOS: edge capacity hosting overlays of nano data centers
In this paper we propose a radical solution to data hosting and delivery for the Internet of the future. The current data delivery architecture is "network centric", wit...
Nikolaos Laoutaris, Pablo Rodriguez, Laurent Masso...
SYSTOR
2009
ACM
15 years 4 months ago
The effectiveness of deduplication on virtual machine disk images
Virtualization is becoming widely deployed in servers to efficiently provide many logically separate execution environments while reducing the need for physical servers. While th...
Keren Jin, Ethan L. Miller
STORAGESS
2005
ACM
15 years 3 months ago
Toward a threat model for storage systems
The growing number of storage security breaches as well as the need to adhere to government regulations is driving the need for greater storage protection. However, there is the l...
Ragib Hasan, Suvda Myagmar, Adam J. Lee, William Y...
NTMS
2008
IEEE
15 years 4 months ago
MASA: End-to-End Data Security in Sensor Networks Using a Mix of Asymmetric and Symmetric Approaches
Wireless Sensor Networks (WSNs) are a new technology that is expected to be used increasingly in the near future due to its cheap cost and data processing ability. However, securi...
Hani Alzaid, Manal Alfaraj
SAC
2009
ACM
15 years 4 months ago
Prestige-based peer sampling service: interdisciplinary approach to secure gossip
The Peer Sampling Service (PSS) has been proposed as a method to initiate and maintain the set of connections between nodes in unstructured peer to peer (P2P) networks. The PSS us...
Gian Paolo Jesi, Edoardo Mollona, Srijith K. Nair,...