Sciweavers

8655 search results - page 413 / 1731
» Challenges for Trusted Computing
Sort
View
ICDE
2008
IEEE
182views Database» more  ICDE 2008»
16 years 5 months ago
SpaceTwist: Managing the Trade-Offs Among Location Privacy, Query Performance, and Query Accuracy in Mobile Services
In a mobile service scenario, users query a server for nearby points of interest but they may not want to disclose their locations to the service. Intuitively, location privacy may...
Man Lung Yiu, Christian S. Jensen, Xuegang Huang, ...
OSDI
2008
ACM
16 years 4 months ago
Network Imprecision: A New Consistency Metric for Scalable Monitoring
This paper introduces a new consistency metric, Network Imprecision (NI), to address a central challenge in largescale monitoring systems: safeguarding correctness despite node an...
Navendu Jain, Prince Mahajan, Dmitry Kit, Praveen ...
171
Voted
EUROSYS
2008
ACM
16 years 1 months ago
Manageable fine-grained information flow
The continuing frequency and seriousness of security incidents underlines the importance of application security. Decentralized information flow control (DIFC), a promising tool ...
Petros Efstathopoulos, Eddie Kohler
SOSP
2007
ACM
16 years 28 days ago
Dynamo: amazon's highly available key-value store
Reliability at massive scale is one of the biggest challenges we face at Amazon.com, one of the largest e-commerce operations in the world; even the slightest outage has significa...
Giuseppe DeCandia, Deniz Hastorun, Madan Jampani, ...
ACSAC
2009
IEEE
15 years 11 months ago
Scalable Web Content Attestation
—The web is a primary means of information sharing for most organizations and people. Currently, a recipient of web content knows nothing about the environment in which that info...
Thomas Moyer, Kevin R. B. Butler, Joshua Schiffman...