Sciweavers

3349 search results - page 26 / 670
» Data Security
Sort
View
DGO
2004
78views Education» more  DGO 2004»
14 years 11 months ago
Scalable and Secure Data Collection: Fault Tolerance Considerations
Data collection, or uploading, is an inherent part of numerous digital government applications. In this poster we present our recent research directions in the development of Bist...
William C. Cheng, Leslie Cheung, Cheng-Fu Chou, Le...
LISA
2008
15 years 2 days ago
Concord: A Secure Mobile Data Authorization Framework for Regulatory Compliance
With the increasing adoption of mobile computing devices that carry confidential data, organizations need to secure data in an ever-changing environment. Critical organizational d...
Gautam Singaraju, Brent Hoon Kang
ACSW
2006
14 years 11 months ago
Logcrypt: forward security and public verification for secure audit logs
Logcrypt provides strong cryptographic assurances that data stored by a logging facility before a system compromise cannot be modified after the compromise without detection. We b...
Jason E. Holt
IEEEARES
2008
IEEE
15 years 4 months ago
A Secure and Scalable Infrastructure for Inter-Organizational Data Exchange and eGovernment Applications
As more and more information becomes accessible via on-line databases, more public services can be provided and more complex queries involving several registers become feasible as...
Jan Willemson, Arne Ansper
SP
2006
IEEE
104views Security Privacy» more  SP 2006»
15 years 3 months ago
A Logic for Constraint-based Security Protocol Analysis
We propose PS-LTL, a pure-past security linear temporal logic that allows the specification of a variety of authentication, secrecy and data freshness properties. Furthermore, we...
Ricardo Corin, Sandro Etalle, Ari Saptawijaya