Sciweavers

579 search results - page 40 / 116
» Secure Access to Medical Data over the Internet
Sort
View
GECCO
2004
Springer
106views Optimization» more  GECCO 2004»
15 years 7 months ago
Evolving En-Route Caching Strategies for the Internet
Nowadays, large distributed databases are commonplace. Client applications increasingly rely on accessing objects from multiple remote hosts. The Internet itself is a huge network ...
Jürgen Branke, Pablo Funes, Frederik Thiele
POPL
2004
ACM
16 years 1 months ago
Asynchronous and deterministic objects
We present in this article a precise security model for data confidentiality in the framework of asynchronous and deterministic objects. Our underlying programming model is based ...
Denis Caromel, Ludovic Henrio, Bernard P. Serpette
SP
2010
IEEE
152views Security Privacy» more  SP 2010»
14 years 11 months ago
Scalable Parametric Verification of Secure Systems: How to Verify Reference Monitors without Worrying about Data Structure Size
The security of systems such as operating systems, hypervisors, and web browsers depend critically on reference monitors to correctly enforce their desired security policy in the ...
Jason Franklin, Sagar Chaki, Anupam Datta, Arvind ...
105
Voted
ACSAC
2010
IEEE
14 years 11 months ago
Keeping data secret under full compromise using porter devices
We address the problem of confidentiality in scenarios where the attacker is not only able to observe the communication between principals, but can also fully compromise the commu...
Christina Pöpper, David A. Basin, Srdjan Capk...
MMNS
2001
96views Multimedia» more  MMNS 2001»
15 years 2 months ago
The Impact of Confidentiality on Quality of Service in Heterogeneous Voice over IP Networks
Abstract. With the advent of ubiquitous access to multimedia content via wireless networks, users are more likely to have their data traverse a heterogeneous internetwork. Given th...
Johnathan M. Reason, David G. Messerschmitt