Sciweavers

3349 search results - page 88 / 670
» Data Security
Sort
View
INFOCOM
2010
IEEE
15 years 1 months ago
SafeQ: Secure and Efficient Query Processing in Sensor Networks
The architecture of two-tiered sensor networks, where storage nodes serve as an intermediate tier between sensors and a sink for storing data and processing queries, has been widel...
Fei Chen, Alex X. Liu
INFOCOM
2012
IEEE
13 years 5 months ago
Secure top-k query processing via untrusted location-based service providers
Abstract—This paper considers a novel distributed system for collaborative location-based information generation and sharing which become increasingly popular due to the explosiv...
Rui Zhang 0007, Yanchao Zhang, Chi Zhang
125
Voted
ESSOS
2010
Springer
16 years 5 days ago
Automatic Generation of Smart, Security-Aware GUI Models
In many software applications, users access application data using graphical user interfaces (GUIs). There is an important, but little explored, link between visualization and secu...
David A. Basin, Manuel Clavel, Marina Egea, Michae...
PSD
2004
Springer
94views Database» more  PSD 2004»
15 years 8 months ago
On the Security of Noise Addition for Privacy in Statistical Databases
Noise addition is a family of methods used in the protection of the privacy of individual data (microdata) in statistical databases. This paper is a critical analysis of the securi...
Josep Domingo-Ferrer, Francesc Sebé, Jordi ...
IJNSEC
2008
164views more  IJNSEC 2008»
15 years 3 months ago
Secure Real-Time Streaming Protocol (RTSP) for Hierarchical Proxy Caching
Proxies are commonly used to cache objects, especially multimedia objects, so that clients can enjoy better quality-of-service (QoS) guarantees such as smaller startup latency and...
Yeung Siu Fung, John C. S. Lui, David K. Y. Yau