Sciweavers

24188 search results - page 249 / 4838
» Computing on Encrypted Data
Sort
View
134
Voted
CCS
2008
ACM
15 years 5 months ago
Controlled privacy preserving keyword search
Data sharing on public servers has become a popular service on the Internet, in which users can store and share data with other users through public servers. However, because the ...
Stephen S. Yau, Yin Yin
83
Voted
NPC
2004
Springer
15 years 9 months ago
A Data-Aware Resource Broker for Data Grids
Huy Le, Paul D. Coddington, Andrew L. Wendelborn
206
Voted
ICDE
2007
IEEE
110views Database» more  ICDE 2007»
16 years 5 months ago
Invalidation Clues for Database Scalability Services
For their scalability needs, data-intensive Web applications can use a Database Scalability Service (DBSS), which caches applications' query results and answers queries on th...
Amit Manjhi, Phillip B. Gibbons, Anastassia Ailama...
114
Voted
ATAL
2005
Springer
15 years 9 months ago
Access control with safe role assignment for mobile agents
Mobile agent systems provide new perspectives for distributed e-commerce applications. Sea-of-Data (SoD) applications are those that need to process huge quantities of distributed...
Guillermo Navarro, Joan Borrell, Jose A. Ortega-Ru...
119
Voted
JSAC
2010
86views more  JSAC 2010»
15 years 2 months ago
A randomized countermeasure against parasitic adversaries in wireless sensor networks
—Due to their limited capabilities, wireless sensor nodes are subject to physical attacks that are hard to defend against. In this paper, we first identify a typical attacker, c...
Panagiotis Papadimitratos, Jun Luo, Jean-Pierre Hu...