— Software protection is increasingly necessary for uses in commercial systems, digital content distributors, and military systems. The Secure Software (SecSoft) architecture is ...
Anthony J. Mahar, Peter M. Athanas, Stephen D. Cra...
Several architectures have been recently proposed that store relational data in encrypted form on untrusted relational databases. Such architectures permit the creation of novel I...
Ernesto Damiani, Sabrina De Capitani di Vimercati,...
Federation in TINA CMA (Connection Management Architecture) provides the mechanisms for cooperation between different interworking network domains possibly owned by different admi...
Abstract-- Securely managing shared information in distributed environments across multiple organisations is a challenge. Distributed information management systems must be able to...
Martijn Warnier, Frances M. T. Brazier, Anja Oskam...
In this paper, we study the problem of constructing and maintaining a large shared repository of web pages. We discuss the unique characteristics of such a repository, propose an ...
Jun Hirai, Sriram Raghavan, Hector Garcia-Molina, ...