Sciweavers

3349 search results - page 69 / 670
» Data Security
Sort
View
ICDCSW
2007
IEEE
15 years 9 months ago
Survey of Six Myths and Oversights about Distributed Hash Tables' Security
Distributed Hash Tables (DHT) was not designed to be secure against malicious users. But some secure systems like trust and reputation management algorithms trust DHT with their d...
Sylvain Dahan, Mitsuhisa Sato
DASFAA
2010
IEEE
176views Database» more  DASFAA 2010»
15 years 3 months ago
Efficient Database-Driven Evaluation of Security Clearance for Federated Access Control of Dynamic XML Documents
Achieving data security over cooperating web services is becoming a reality, but existing XML access control architectures do not consider this federated service computing. In this...
Erwin Leonardi, Sourav S. Bhowmick, Mizuho Iwaihar...
HICSS
2011
IEEE
335views Biometrics» more  HICSS 2011»
14 years 7 months ago
Cyberinfrastructure for Secondary Use of EHR Data: SSA's Use of the Nationwide Health Information Network
This study examined the use of the Nationwide Health Information Network as a cyberinfrastructure for secure and interoperable transport of existing clinical data from electronic ...
Sue S. Feldman, Thomas A. Horan
ICISC
2004
173views Cryptology» more  ICISC 2004»
15 years 4 months ago
On Private Scalar Product Computation for Privacy-Preserving Data Mining
In mining and integrating data from multiple sources, there are many privacy and security issues. In several different contexts, the security of the full privacy-preserving data mi...
Bart Goethals, Sven Laur, Helger Lipmaa, Taneli Mi...
ACSAC
2006
IEEE
15 years 9 months ago
A General Dynamic Information Flow Tracking Framework for Security Applications
Many software security solutions require accurate tracking of control/data dependencies among information objects in network applications. This paper presents a general dynamic in...
Lap-Chung Lam, Tzi-cker Chiueh