Sciweavers

579 search results - page 36 / 116
» Secure Access to Medical Data over the Internet
Sort
View
EUROSYS
2010
ACM
15 years 6 months ago
Policy-based access control for weakly consistent replication
Combining access control with weakly consistent replication presents a challenge if the resulting system is to support eventual consistency. If authorization policy can be tempora...
Ted Wobber, Thomas L. Rodeheffer, Douglas B. Terry
WCE
2007
15 years 2 months ago
Beyond Web Intermediaries: A Framework for Securing Digital Content on Client Systems
—The move to begin to place liabilities for copyright violations on internet intermediaries such as ISPs and Cyber Cafes as a result of contents allowed through their networks is...
Stella C. Chiemeke, Olumide B. Longe
SIGOPS
2010
130views more  SIGOPS 2010»
14 years 12 months ago
Storing and accessing live mashup content in the cloud
Today’s Rich Internet Application (RIA) technologies such as Ajax, Flex, or Silverlight, are designed around the client-server paradigm and cannot easily take advantage of repli...
Krzysztof Ostrowski, Ken Birman
WEA
2005
Springer
120views Algorithms» more  WEA 2005»
15 years 7 months ago
Distilling Router Data Analysis for Faster and Simpler Dynamic IP Lookup Algorithms
Abstract. We consider the problem of fast IP address lookup in the forwarding engines of Internet routers. We analyze over 2400 public snapshots of routing tables collected over ï¬...
Filippo Geraci, Roberto Grossi
IAJIT
2010
133views more  IAJIT 2010»
15 years 1 days ago
Improving web services security models
: Web services are considered one of the main technologies which emerged in recent years, they provide an application integration technology that allows business applications to co...
Sawsan Abu-Taleb, Hossam Mustafa