Sciweavers

24188 search results - page 241 / 4838
» Computing on Encrypted Data
Sort
View
SP
1987
IEEE
118views Security Privacy» more  SP 1987»
15 years 7 months ago
A Comparison of Commercial and Military Computer Security Policies
Most discussions of computer security focus on control of disclosure. In Particular, the U.S. Department of Defense has developed a set of criteria for computer mechanisms to prov...
D. D. Clark, D. R. Wilson
68
Voted
COMPUTER
2002
47views more  COMPUTER 2002»
15 years 3 months ago
Using Coplink to Analyze Criminal-Justice Data
Roslin V. Hauck, Homa Atabakhsh, Pichai Ongvasith,...
COMPUTER
1999
65views more  COMPUTER 1999»
15 years 3 months ago
Extending NASA's Data Processing to Spacecraft
Marco A. Figueiredo, Patrick H. Stakem, Thomas P. ...
203
Voted
COMPUTING
2011
14 years 10 months ago
Cloud computing for small research groups in computational science and engineering: current status and outlook
Abstract Cloud computing could offer good business models for small CSE (Computational Science and Engineering) research groups because these groups often do not have enough human ...
Hong Linh Truong, Schahram Dustdar
115
Voted
CHI
2006
ACM
16 years 4 months ago
Support for activity-based computing in a personal computing operating system
Research has shown that computers are notoriously bad at supporting the management of parallel activities and interruptions, and that mobility increases the severity and scope of ...
Jakob E. Bardram, Jonathan Bunde-Pedersen, Mads S&...