Sciweavers

690 search results - page 114 / 138
» Extended Software Architecture Based on Security Patterns
Sort
View
147
Voted
SAC
2010
ACM
15 years 9 months ago
Of mice and terms: clustering algorithms on ambiguous terms in folksonomies
Developed using the principles of the Model-View-Controller architectural pattern, FolksEngine is a parametric search engine for folksonomies that allows us to test arbitrary sear...
Nicola Raffaele Di Matteo, Silvio Peroni, Fabio Ta...
136
Voted
ICONFERENCE
2011
14 years 10 months ago
Personalized location-based services
Location-Based Services (LBS) are based on a combination of the inherent location information about specific data, and/or the location information supplied by LBS clients, reques...
Yiming Liu, Erik Wilde
129
Voted
IACR
2011
110views more  IACR 2011»
14 years 3 months ago
On the (In)security of Hash-based Oblivious RAM and a New Balancing Scheme
With the gaining popularity of remote storage (e.g. in the Cloud), we consider the setting where a small, protected local machine wishes to access data on a large, untrusted remot...
Eyal Kushilevitz, Steve Lu, Rafail Ostrovsky
147
Voted
SIGMOD
2001
ACM
134views Database» more  SIGMOD 2001»
16 years 3 months ago
Preservation of Digital Data with Self-Validating, Self-Instantiating Knowledge-Based Archives
Digital archives are dedicated to the long-term preservation of electronic information and have the mandate to enable sustained access despite rapid technology changes. Persistent...
Bertram Ludäscher, Richard Marciano, Reagan Moore
137
Voted
ACSAC
2007
IEEE
15 years 10 months ago
Establishing and Sustaining System Integrity via Root of Trust Installation
Integrity measurements provide a means by which distributed systems can assess the trustability of potentially compromised remote hosts. However, current measurement techniques si...
Luke St. Clair, Joshua Schiffman, Trent Jaeger, Pa...