Sciweavers

1906 search results - page 237 / 382
» Data Privacy
Sort
View
STORAGESS
2005
ACM
15 years 9 months ago
Ensuring data integrity in storage: techniques and applications
Data integrity is a fundamental aspect of storage security and reliability. With the advent of network storage and new technology trends that result in new failure modes for stora...
Gopalan Sivathanu, Charles P. Wright, Erez Zadok
TCC
2012
Springer
240views Cryptology» more  TCC 2012»
13 years 11 months ago
Computing on Authenticated Data
In tandem with recent progress on computing on encrypted data via fully homomorphic encryption, we present a framework for computing on authenticated data via the notion of slight...
Jae Hyun Ahn, Dan Boneh, Jan Camenisch, Susan Hohe...
EUSAI
2007
Springer
15 years 10 months ago
Evaluating Confidence in Context for Context-Aware Security
We propose a software framework that augments context data with a range of assorted confidence/reputation metadata for dimensions such as security, privacy, safety, reliability, or...
Marc Lacoste, Gilles Privat, Fano Ramparany
PVLDB
2010
123views more  PVLDB 2010»
15 years 2 months ago
Toward Scalable Keyword Search over Relational Data
Keyword search (KWS) over relational databases has recently received significant attention. Many solutions and many prototypes have been developed. This task requires addressing ...
Akanksha Baid, Ian Rae, Jiexing Li, AnHai Doan, Je...
167
Voted
DASFAA
2006
IEEE
134views Database» more  DASFAA 2006»
15 years 10 months ago
Authentication of Outsourced Databases Using Signature Aggregation and Chaining
Database outsourcing is an important emerging trend which involves data owners delegating their data management needs to an external service provider. Since a service provider is a...
Maithili Narasimha, Gene Tsudik