Sciweavers

78 search results - page 13 / 16
» Managing Trusted Keys in Internet-Scale Systems
Sort
View
DEBU
2007
141views more  DEBU 2007»
14 years 11 months ago
Issues in Building Practical Provenance Systems
The importance of maintaining provenance has been widely recognized, particularly with respect to highly-manipulated data. However, there are few deployed databases that provide p...
Adriane Chapman, H. V. Jagadish
SRDS
2003
IEEE
15 years 4 months ago
Pesto Flavoured Security
We demonstrate that symmetric-key cryptography can be used for both read and write access control. One-time write access can be granted by handing over an encryption key, and our ...
Feike W. Dillema, Tage Stabell-Kulø
EUSAI
2003
Springer
15 years 4 months ago
Ubiquitous Attentiveness - Enabling Context-Aware Mobile Applications and Services
Abstract. We present a concept called ‘ubiquitous attentiveness’: Context information concerning the user and his environment is aggregated, exchanged and constitutes triggers ...
Herma Van Kranenburg, Alfons H. Salden, Henk Eerti...
ASPLOS
2012
ACM
13 years 7 months ago
Architectural support for hypervisor-secure virtualization
Virtualization has become a standard part of many computer systems. A key part of virtualization is the all-powerful hypervisor which manages the physical platform and can access ...
Jakub Szefer, Ruby B. Lee
ATAL
2005
Springer
15 years 5 months ago
Access control with safe role assignment for mobile agents
Mobile agent systems provide new perspectives for distributed e-commerce applications. Sea-of-Data (SoD) applications are those that need to process huge quantities of distributed...
Guillermo Navarro, Joan Borrell, Jose A. Ortega-Ru...