Sciweavers

403 search results - page 26 / 81
» Efficient Algorithms for Secure Multicast key Management
Sort
View
126
Voted
EDBT
2004
ACM
108views Database» more  EDBT 2004»
16 years 3 months ago
A Framework for Efficient Storage Security in RDBMS
Abstract. With the widespread use of e-business coupled with the public's awareness of data privacy issues and recent database security related legislations, incorporating sec...
Balakrishna R. Iyer, Sharad Mehrotra, Einar Myklet...
113
Voted
DSN
2004
IEEE
15 years 7 months ago
Data-Aware Multicast
This paper presents a multicast algorithm for peer-topeer dissemination of events in a distributed topic-based publish-subscribe system, where processes publish events of certain ...
Sébastien Baehni, Patrick Th. Eugster, Rach...
130
Voted
AINA
2007
IEEE
15 years 10 months ago
Heuristics for Improving Cryptographic Key Assignment in a Hierarchy
In hierarchical distributed systems, shared data access can be controlled by assigning user groups single cryptographic keys that allow high level users derive low level keys, but...
Anne V. D. M. Kayem, Patrick Martin, Selim G. Akl
127
Voted
CIS
2006
Springer
15 years 7 months ago
Senior Executives Commitment to Information Security - from Motivation to Responsibility
For senior executives, information security is a basic requirement for business success. Yet, despite being well-motivated, top managers often have only a superficial understandin...
Jorma Kajava, Juhani Anttila, Rauno Varonen, Reijo...
151
Voted
CORR
2008
Springer
181views Education» more  CORR 2008»
15 years 3 months ago
Hierarchical Grid-Based Pairwise Key Pre-distribution in Wireless Sensor Networks
The security of wireless sensor networks is an active topic of research where both symmetric and asymmetric key cryptography issues have been studied. Due to their computational f...
Abedelaziz Mohaisen, DaeHun Nyang, KyungHee Lee