Sciweavers

1457 search results - page 85 / 292
» Privacy Challenges for Database Systems
Sort
View
ACSAC
2006
IEEE
15 years 9 months ago
V-COPS: A Vulnerability-Based Cooperative Alert Distribution System
The efficiency of promptly releasing security alerts of established analysis centers has been greatly challenged by the continuous emergence of various large scale network attack...
Shiping Chen, Dongyu Liu, Songqing Chen, Sushil Ja...
ESORICS
2010
Springer
15 years 4 months ago
Readers Behaving Badly - Reader Revocation in PKI-Based RFID Systems
Abstract. Recent emergence of RFID tags capable of performing public key operations motivates new RFID applications, including electronic travel documents, identification cards and...
Rishab Nithyanand, Gene Tsudik, Ersin Uzun
115
Voted
SP
2003
IEEE
104views Security Privacy» more  SP 2003»
15 years 8 months ago
Using Replication and Partitioning to Build Secure Distributed Systems
A challenging unsolved security problem is how to specify and enforce system-wide security policies; this problem is even more acute in distributed systems with mutual distrust. T...
Lantian Zheng, Stephen Chong, Andrew C. Myers, Ste...
ACSAC
2009
IEEE
15 years 10 months ago
Protecting Kernel Code and Data with a Virtualization-Aware Collaborative Operating System
Abstract—The traditional virtual machine usage model advocates placing security mechanisms in a trusted VM layer and letting the untrusted guest OS run unaware of the presence of...
Daniela Alvim Seabra de Oliveira, Shyhtsun Felix W...
152
Voted
PODS
2002
ACM
136views Database» more  PODS 2002»
16 years 3 months ago
Models and Issues in Data Stream Systems
In this overview paper we motivate the need for and research issues arising from a new model of data processing. In this model, data does not take the form of persistent relations...
Brian Babcock, Shivnath Babu, Mayur Datar, Rajeev ...