Sciweavers

24529 search results - page 232 / 4906
» Computing on Authenticated Data
Sort
View
125
Voted
ECOWS
2008
Springer
15 years 5 months ago
Validating Orchestration of Web Services with BPEL and Aggregate Signatures
In this paper, we present a framework providing integrity and authentication for secure workflow computation based on BPEL Web Service orchestration. We address a recent cryptogra...
Carlo Blundo, Emiliano De Cristofaro, Clemente Gal...
60
Voted
COMPUTER
2008
65views more  COMPUTER 2008»
15 years 3 months ago
Reducing the Storage Burden via Data Deduplication
David Geer
137
Voted
SOUPS
2006
ACM
15 years 9 months ago
A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords
Previous research has found graphical passwords to be more memorable than non-dictionary or “strong” alphanumeric passwords. Participants in a prior study expressed concerns t...
Furkan Tari, A. Ant Ozok, Stephen H. Holden
131
Voted
KDD
2004
ACM
132views Data Mining» more  KDD 2004»
16 years 3 months ago
Privacy preserving regression modelling via distributed computation
Reluctance of data owners to share their possibly confidential or proprietary data with others who own related databases is a serious impediment to conducting a mutually beneficia...
Ashish P. Sanil, Alan F. Karr, Xiaodong Lin, Jerom...
128
Voted
ICCD
2000
IEEE
107views Hardware» more  ICCD 2000»
16 years 13 days ago
Architectural Impact of Secure Socket Layer on Internet Servers
Secure socket layer SSL is the most popular protocol used in the Internet for facilitating secure communications through authentication, encryption, and decryption. Although the...
Krishna Kant, Ravishankar K. Iyer, Prasant Mohapat...