Sciweavers

931 search results - page 152 / 187
» Management of personal information scraps
Sort
View
EUROSYS
2006
ACM
15 years 10 months ago
Database replication policies for dynamic content applications
The database tier of dynamic content servers at large Internet sites is typically hosted on centralized and expensive hardware. Recently, research prototypes have proposed using d...
Gokul Soundararajan, Cristiana Amza, Ashvin Goel
CCS
2009
ACM
15 years 8 months ago
A practical property-based bootstrap architecture
Binary attestation, as proposed by the Trusted Computing Group (TCG), is a pragmatic approach for software integrity protection and verification. However, it has also various sho...
René Korthaus, Ahmad-Reza Sadeghi, Christia...
SYSTOR
2009
ACM
15 years 7 months ago
DHIS: discriminating hierarchical storage
A typical storage hierarchy comprises of components with varying performance and cost characteristics, providing multiple options for data placement. We propose and evaluate a hie...
Chaitanya Yalamanchili, Kiron Vijayasankar, Erez Z...
ICC
2007
IEEE
139views Communications» more  ICC 2007»
15 years 7 months ago
Constant Storage Self-Healing Key Distribution with Revocation in Wireless Sensor Network
— A self-healing key distribution scheme enables a large group of users (sensor nodes) to establish a session key dynamically over an unreliable, or lossy wireless network. The m...
Ratna Dutta, Yong Dong Wu, Sourav Mukhopadhyay
111
Voted
CCS
2007
ACM
15 years 7 months ago
Incremental adaptation of XPath access control views
Materialized XPath access-control views are commonly used for enforcing access control. When access control rules defining a materialized XML access-control view change, the view...
Padmapriya Ayyagari, Prasenjit Mitra, Dongwon Lee,...