Sciweavers

464 search results - page 71 / 93
» Privacy Engineering for Digital Rights Management Systems
Sort
View
ICS
2003
Tsinghua U.
15 years 3 months ago
AEGIS: architecture for tamper-evident and tamper-resistant processing
We describe the architecture for a single-chip aegis processor which can be used to build computing systems secure against both physical and software attacks. Our architecture ass...
G. Edward Suh, Dwaine E. Clarke, Blaise Gassend, M...
CLEF
2008
Springer
14 years 11 months ago
Robust Question Answering for Speech Transcripts: UPC Experience in QAst 2008
This paper describes the participation of the Technical University of Catalonia in the CLEF 2008 Question Answering on Speech Transcripts track. We have participated in the Englis...
Pere Comas, Jordi Turmo
SACMAT
2009
ACM
15 years 4 months ago
Supporting RBAC with XACML+OWL
XACML does not natively support RBAC and even the specialized XACML profiles are not able to support many relevant constraints such as static and dynamic separation of duty. Exte...
Rodolfo Ferrini, Elisa Bertino
SIGMOD
2011
ACM
220views Database» more  SIGMOD 2011»
14 years 24 days ago
Zephyr: live migration in shared nothing databases for elastic cloud platforms
Multitenant data infrastructures for large cloud platforms hosting hundreds of thousands of applications face the challenge of serving applications characterized by small data foo...
Aaron J. Elmore, Sudipto Das, Divyakant Agrawal, A...
EUROSYS
2008
ACM
15 years 7 months ago
BorderPatrol: isolating events for black-box tracing
Causal request traces are valuable to developers of large concurrent and distributed applications, yet difficult to obtain. Traces show how a request is processed, and can be anal...
Eric Koskinen, John Jannotti