Sciweavers

3349 search results - page 138 / 670
» Data Security
Sort
View
132
Voted
ICDE
2008
IEEE
141views Database» more  ICDE 2008»
15 years 10 months ago
Provenance-aware secure networks
Network accountability and forensic analysis have become increasingly important, as a means of performing network diagnostics, identifying malicious nodes, enforcing trust managem...
Wenchao Zhou, Eric Cronin, Boon Thau Loo
101
Voted
CSREASAM
2007
15 years 5 months ago
Survey of Supercomputer Cluster Security Issues
- The authors believe that providing security for supercomputer clusters is different from providing security for stand-alone PCs. The types of programs that supercomputer clusters...
George Markowsky, Linda Markowsky
TWC
2008
170views more  TWC 2008»
15 years 3 months ago
Secure and Serverless RFID Authentication and Search Protocols
With the increased popularity of RFID applications, different authentication schemes have been proposed to provide security and privacy protection for users. Most recent RFID proto...
Chiu Chiang Tan, Bo Sheng, Qun Li
208
Voted
SIGMOD
2006
ACM
142views Database» more  SIGMOD 2006»
16 years 3 months ago
Model driven development of secure XML databases
In this paper, we propose a methodological approach for the model driven development of secure XML databases (DB). This proposal is within the framework of MIDAS, a model driven m...
Belén Vela, Eduardo Fernández-Medina, Esperanza ...
137
Voted
PDCAT
2005
Springer
15 years 9 months ago
Trusted Computing-Based Security Architecture For 4G Mobile Networks
In this paper security requirements and security architecture for 4G systems are presented with the consideration of Trusted Computing (TC) for mobile equipment (ME). The security...
Yu Zheng, Dake He, Weichi Yu, Xiaohu Tang