Sciweavers

1477 search results - page 173 / 296
» Scalable Management
Sort
View
126
Voted
CCGRID
2004
IEEE
15 years 8 months ago
A hardware-secured credential repository for Grid PKIs
Public Key Infrastructures suffer from usability and security problems associated with the request for and secure management of end user credentials. Online credential repositorie...
Markus Lorch, Jim Basney, Dennis G. Kafura
154
Voted
CCS
2006
ACM
15 years 8 months ago
Virtual monotonic counters and count-limited objects using a TPM without a trusted OS
A trusted monotonic counter is a valuable primitive that enables a wide variety of highly scalable offline and decentralized applications that would otherwise be prone to replay a...
Luis F. G. Sarmenta, Marten van Dijk, Charles W. O...
ADBIS
2006
Springer
139views Database» more  ADBIS 2006»
15 years 8 months ago
Xeek: An Efficient Method for Supporting XPath Evaluation with Relational Databases
We introduce Xeek, a method for managing XML documents using relational databases. Most previous proposals in which the XPath axes are evaluated using only the pre- and postorder n...
Olli Luoma
ACSAC
2001
IEEE
15 years 8 months ago
Secure Anonymous Group Infrastructure for Common and Future Internet Applications
Secure group communication protocols, in particular multi-party key agreement and update algorithms, help promote traditional and new Internet multi-party applications such as vid...
Nathalie Weiler
CIKM
2001
Springer
15 years 8 months ago
SQL Database Primitives for Decision Tree Classifiers
Scalable data mining in large databases is one of today's challenges to database technologies. Thus, substantial effort is dedicated to a tight coupling of database and data ...
Kai-Uwe Sattler, Oliver Dunemann