Sciweavers

2904 search results - page 308 / 581
» Internet Infrastructure Security
Sort
View
DBSEC
2007
128views Database» more  DBSEC 2007»
15 years 6 months ago
gVault: A Gmail Based Cryptographic Network File System
Abstract. In this paper, we present the design of gVault, a cryptographic network file system that utilizes the data storage provided by Gmail’s web-based email service. Such a ...
Ravi Chandra Jammalamadaka, Roberto Gamboni, Shara...
ICWS
2003
IEEE
15 years 6 months ago
Access Control in Dynamic XML-Based Web-Services with X-RBAC
Policy specification for securing Web services is fast emerging as a key research area due to rapid proliferation of Web services in modern day enterprise applications. Whilst the...
Rafae Bhatti, James Joshi, Elisa Bertino, Arif Gha...

Lecture Notes
401views
17 years 3 months ago
Introduction to Computer Networking
The lecture notes cover the following topics, Course Overview , Data Communications and Networking Overview , Data Transmission , Transmission Media , Signal Encoding Techniques ...
Raj Jain
143
Voted
ESORICS
2009
Springer
15 years 11 months ago
Privacy in Georeferenced Context-Aware Services: A Survey
Location based services (LBS) are a specific instance of a broader class of Internet services that are predicted to become popular in a near future: context-aware services. The pr...
Daniele Riboni, Linda Pareschi, Claudio Bettini
162
Voted
SAINT
2008
IEEE
15 years 11 months ago
Performance Measurements and Statistics of Tor Hidden Services
Tor (The Onion Routing) provides a secure mechanism for offering TCP-based services while concealing the hidden server’s IP address. In general the acceptance of services strong...
Karsten Loesing, Werner Sandmann, Christian Wilms,...