Sciweavers

3349 search results - page 165 / 670
» Data Security
Sort
View
130
Voted
EDBT
2010
ACM
237views Database» more  EDBT 2010»
15 years 10 months ago
BronzeGate: real-time transactional data obfuscation for GoldenGate
Data privacy laws have appeared recently, such as the HIPAA laws for protecting medical records, and the PCI guidelines for protecting Credit Card information. Data privacy can be...
Shenoda Guirguis, Alok Pareek
257
Voted
INFOCOM
2011
IEEE
14 years 7 months ago
Secure and practical outsourcing of linear programming in cloud computing
—Cloud Computing has great potential of providing robust computational power to the society at reduced cost. It enables customers with limited computational resources to outsourc...
Cong Wang, Kui Ren, Jia Wang
123
Voted
IPPS
2007
IEEE
15 years 10 months ago
GridCopy: Moving Data Fast on the Grid
An important type of communication in grid and distributed computing environments is bulk data transfer. GridFTP has emerged as a de facto standard for secure, reliable, high-perf...
Rajkumar Kettimuthu, William E. Allcock, Lee Limin...
161
Voted
ISORC
2008
IEEE
15 years 10 months ago
MRBAC: Hierarchical Role Management and Security Access Control for Distributed Multimedia Systems
In this paper, a Role-based Access Control (RBAC) model is applied and extended to a multimedia version called Multi-Role Based Access Control (MRBAC), which can fully support the...
Na Zhao, Min Chen, Shu-Ching Chen, Mei-Ling Shyu
130
Voted
ITNG
2007
IEEE
15 years 10 months ago
Securing MPLS Networks with Multi-path Routing
— MPLS security is an evolving issue which has been raised by many researchers and service providers. The basic architecture of MPLS network does not provide security services su...
Sahel Alouneh, Abdeslam En-Nouaary, Anjali Agarwal