Sciweavers

579 search results - page 61 / 116
» Secure Access to Medical Data over the Internet
Sort
View
118
Voted
WWW
2005
ACM
16 years 2 months ago
GlobeDB: autonomic data replication for web applications
We present GlobeDB, a system for hosting Web applications that performs autonomic replication of application data. GlobeDB offers data-intensive Web applications the benefits of l...
Swaminathan Sivasubramanian, Gustavo Alonso, Guill...
ICISC
1998
132views Cryptology» more  ICISC 1998»
15 years 2 months ago
The flood-gate principle - a hybrid approach to a high security solution
The classical role of a firewall consists in protecting a computer network against attacks from the outside world, especially the Internet. Firewalls are often expensive, hard to c...
Ernst Georg Haffner, Thomas Engel, Christoph Meine...
VLDB
2007
ACM
111views Database» more  VLDB 2007»
15 years 7 months ago
Security in Outsourcing of Association Rule Mining
Outsourcing association rule mining to an outside service provider brings several important benefits to the data owner. These include (i) relief from the high mining cost, (ii) m...
Wai Kit Wong, David W. Cheung, Edward Hung, Ben Ka...
DBSEC
2008
196views Database» more  DBSEC 2008»
15 years 3 months ago
Shared and Searchable Encrypted Data for Untrusted Servers
Current security mechanisms are not suitable for organisations that outsource their data management to untrusted servers. Encrypting and decrypting sensitive data at the client si...
Changyu Dong, Giovanni Russello, Naranker Dulay
DSN
2006
IEEE
15 years 7 months ago
Secure Split Assignment Trajectory Sampling: A Malicious Router Detection System
Routing infrastructure plays a vital role in the Internet, and attacks on routers can be damaging. Compromised routers can drop, modify, mis-forward or reorder valid packets. Exis...
Sihyung Lee, Tina Wong, Hyong S. Kim