Sciweavers

3349 search results - page 119 / 670
» Data Security
Sort
View
153
Voted

Publication
117views
14 years 11 months ago
Design, Implementation, and Performance Analysis of DiscoSec–Service Pack for Securing WLANs
To improve the already tarnished reputation of WLAN security, the new IEEE 802.11i security standard provides means for an enhanced user authentication and strong data confidential...
Ivan Martinovic, Paul Pichota, Matthias Wilhelm, F...
SACMAT
2006
ACM
15 years 9 months ago
Secure resource description framework: an access control model
In this paper we propose an access control model for the Resource Description Framework (RDF). We argue that existing access control models, like the ones developed for securing e...
Amit Jain, Csilla Farkas
99
Voted
ISI
2007
Springer
15 years 9 months ago
Making Sense of VAST Data
: We view the task of sensemaking in intelligence as that of abducing a story whose plot explains the current data and makes verifiable predictions about the future and the past. W...
Summer Adams, Ashok K. Goel
105
Voted
DBSEC
2004
97views Database» more  DBSEC 2004»
15 years 4 months ago
Configuring Storage Area Networks for Mandatory Security
Storage-area networks are a popular and efficient way of building large storage systems both in an enterprise environment and for multi-domain storage service providers. In both en...
Benjamin Aziz, Simon N. Foley, John Herbert, Garre...
126
Voted
EUROSYS
2007
ACM
16 years 17 days ago
Antiquity: exploiting a secure log for wide-area distributed storage
Antiquity is a wide-area distributed storage system designed to provide a simple storage service for applications like file systems and back-up. The design assumes that all serve...
Hakim Weatherspoon, Patrick R. Eaton, Byung-Gon Ch...