Sciweavers

445 search results - page 52 / 89
» Authorization and Access Control in IRO-DB
Sort
View
PET
2009
Springer
15 years 4 months ago
Privacy-Preserving Policy-Based Information Transfer
As the global society becomes more interconnected and more privacy-conscious, communication protocols must balance access control with protecting participants’ privacy. A common ...
Emiliano De Cristofaro, Stanislaw Jarecki, Jihye K...
77
Voted
CAISE
2003
Springer
15 years 2 months ago
An Administration Console for the CSAP System
Our group is involved in the European funded Webocracy project in which an e-government system called Webocrat has been designed and implemented. Our responsibility is to provide m...
Fredj Dridi, Björn Muschall, Günther Per...
MOBISYS
2007
ACM
15 years 9 months ago
Improving mobile database access over wide-area networks without degrading consistency
We report on the design, implementation, and evaluation of a system called Cedar that enables mobile database access with good performance over low-bandwidth networks. This is acc...
Niraj Tolia, Mahadev Satyanarayanan, Adam Wolbach
CCS
2010
ACM
14 years 10 months ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...
MSS
2007
IEEE
76views Hardware» more  MSS 2007»
15 years 4 months ago
Implementing and Evaluating Security Controls for an Object-Based Storage System
This paper presents the implementation and performance evaluation of a real, secure object-based storage system compliant to the TIO OSD standard. In contrast to previous work, ou...
Zhongying Niu, Ke Zhou, Dan Feng, Hong Jiang, Fran...