Sciweavers

1457 search results - page 124 / 292
» Privacy Challenges for Database Systems
Sort
View
ISI
2005
Springer
15 years 9 months ago
Performance Study of a Compiler/Hardware Approach to Embedded Systems Security
Abstract. Trusted software execution, prevention of code and data tampering, authentication, and providing a secure environment for software are some of the most important security...
Kripashankar Mohan, Bhagirath Narahari, Rahul Simh...
JUCS
2006
113views more  JUCS 2006»
15 years 3 months ago
A Collaborative Biomedical Research System
: The convergence of need between improved clinical care and post genomics research presents a unique challenge to restructuring information flow so that it benefits both without c...
Adel Taweel, Alan L. Rector, Jeremy Rogers
108
Voted
SUTC
2008
IEEE
15 years 10 months ago
Controlled Disclosure of Context Information across Ubiquitous Computing Domains
One of the challenges in ubiquitous computing is that of mobility, which typically requires interaction between intelligent environments in different domains of administration. We...
Cristian Hesselman, Henk Eertink, Martin Wibbels, ...
120
Voted
SP
2008
IEEE
138views Security Privacy» more  SP 2008»
15 years 10 months ago
Practical Proactive Integrity Preservation: A Basis for Malware Defense
Unlike today’s reactive approaches, information flow based approaches can provide positive assurances about overall system integrity, and hence can defend against sophisticated...
Weiqing Sun, R. Sekar, Gaurav Poothia, Tejas Karan...
171
Voted
WISTP
2010
Springer
15 years 10 months ago
Fraud Detection for Voice over IP Services on Next-Generation Networks
The deployment of Next-Generation Networks (NGN) is a challenge that requires integrating heterogeneous services into a global system of All-IP telecommunications. These networks c...
Igor Ruiz-Agundez, Yoseba K. Penya, Pablo Garcia B...