Sciweavers

2386 search results - page 210 / 478
» Database Security 2000
Sort
View
EUROMICRO
2009
IEEE
15 years 2 months ago
Multi-layered Virtual Machines for Security Updates in Grid Environments
The use of user specific virtual machines (VMs) in Grid and Cloud computing reduces the administration overhead associated with manually installing required software for every user...
Roland Schwarzkopf, Matthias Schmidt, Niels Fallen...
IC
2004
15 years 3 days ago
A Web Interface for Nessus Network Security Scanner
A fully functional web interface (NessusWeb) for the Nessus network security scanner has been developed. NessusWeb provides public accessibility for authorized users and supports ...
Chuming Chen, Manton M. Matthews
IEEEARES
2008
IEEE
15 years 5 months ago
Privacy-Preserving Distributed Set Intersection
With the growing demand of databases outsourcing and its security concerns, we investigate privacy-preserving set intersection in a distributed scenario. We propose a one-round pr...
Qingsong Ye, Huaxiong Wang, Christophe Tartary
ESORICS
2006
Springer
15 years 2 months ago
Private Information Retrieval Using Trusted Hardware
Abstract. Many theoretical PIR (Private Information Retrieval) constructions have been proposed in the past years. Though information theoretically secure, most of them are impract...
Shuhong Wang, Xuhua Ding, Robert H. Deng, Feng Bao
ACSW
2003
15 years 3 days ago
A Secure Pervasive Environment
This paper explores the complications encountered when attempting to create a secure pervasive computing environment. The model introduced in this paper is primarily conceptual. T...
Patrick G. McLean