Sciweavers

3349 search results - page 135 / 670
» Data Security
Sort
View
151
Voted
MSS
2000
IEEE
130views Hardware» more  MSS 2000»
15 years 7 months ago
Design for a Decentralized Security System For Network Attached Storage
T This paper describes an architecture for a secure file system based on network-attached storage that guarantees end-to-end encryption for all user data. We describe the design of...
William E. Freeman, Ethan L. Miller
150
Voted
BNCOD
2003
150views Database» more  BNCOD 2003»
15 years 5 months ago
Multilevel Secure Rules and Its Impact on the Design of Active Database Systems
The event-condition-action paradigm (also known as triggers or rules) gives a database “active” capabilities – the ability to react automatically to changes in the database o...
Indrakshi Ray
104
Voted
IEEESP
2010
99views more  IEEESP 2010»
15 years 2 months ago
The Iterated Weakest Link
Abstract. We devise a model for security investment that reflects dynamic interaction between a defender, who faces uncertainty, and an attacker, who repeatedly targets the weakes...
Rainer Böhme, Tyler Moore
129
Voted
HICSS
2003
IEEE
101views Biometrics» more  HICSS 2003»
15 years 8 months ago
Displaying Aggregate Data, Interrelated Quantities, and Data Trends in Electric Power Systems
This paper describes a number of effective techniques for visualizing some of the more complex data relationships that characterize an electric power system in real time. Power sy...
Ray Klump, Warren Wu, Greg Dooley
129
Voted
KDD
2004
ACM
160views Data Mining» more  KDD 2004»
16 years 4 months ago
k-TTP: a new privacy model for large-scale distributed environments
Secure multiparty computation allows parties to jointly compute a function of their private inputs without revealing anything but the output. Theoretical results [2] provide a gen...
Bobi Gilburd, Assaf Schuster, Ran Wolff