Sciweavers

242 search results - page 28 / 49
» Cryptographic Cloud Storage
Sort
View
CLOUD
2010
ACM
15 years 4 months ago
Hermes: clustering users in large-scale e-mail services
Hermes is an optimization engine for large-scale enterprise e-mail services. Such services could be hosted by a virtualized e-mail service provider, or by dedicated enterprise dat...
Thomas Karagiannis, Christos Gkantsidis, Dushyanth...
SIGMOD
2009
ACM
149views Database» more  SIGMOD 2009»
15 years 12 months ago
CourseRank: a social system for course planning
Special-purpose social sites can offer valuable services to well-defined, closed, communities, e.g., in a university or in a corporation. The purpose of this demo is to show the c...
Benjamin Bercovitz, Filip Kaliszan, Georgia Koutri...
EDBT
2008
ACM
147views Database» more  EDBT 2008»
15 years 12 months ago
iDataGuard: middleware providing a secure network drive interface to untrusted internet data storage
In this demonstration, we present the design and features of iDataGuard. iDataGuard is an interoperable security middleware that allows users to outsource their file systems to he...
Ravi Chandra Jammalamadaka, Roberto Gamboni, Shara...
STORAGESS
2005
ACM
15 years 5 months ago
Ensuring data integrity in storage: techniques and applications
Data integrity is a fundamental aspect of storage security and reliability. With the advent of network storage and new technology trends that result in new failure modes for stora...
Gopalan Sivathanu, Charles P. Wright, Erez Zadok
STOC
2010
ACM
189views Algorithms» more  STOC 2010»
15 years 9 months ago
Near-optimal extractors against quantum storage
We give near-optimal constructions of extractors secure against quantum bounded-storage adversaries. One instantiation gives the first such extractor to achieve an output length (...
Anindya De and Thomas Vidick