Sciweavers

712 search results - page 62 / 143
» Secure Data Management in Trusted Computing
Sort
View
OOPSLA
2009
Springer
15 years 8 months ago
Dependable, online upgrades in enterprise systems
Software upgrades are unreliable, often causing downtime or data loss. I propose Imago, an approach for removing the leading causes of upgrade failures (broken dependencies) and o...
Tudor Dumitras

Lecture Notes
401views
16 years 11 months ago
Introduction to Computer Networking
The lecture notes cover the following topics, Course Overview , Data Communications and Networking Overview , Data Transmission , Transmission Media , Signal Encoding Techniques ...
Raj Jain
SACMAT
2005
ACM
15 years 7 months ago
Purpose based access control of complex data for privacy protection
As privacy becomes a major concern for both consumers and enterprises, many research efforts have been devoted to the development of privacy protecting technology. We recently pr...
Ji-Won Byun, Elisa Bertino, Ninghui Li
CCS
2008
ACM
15 years 3 months ago
On spatio-temporal constraints and inheritance in role-based access control
Pervasive computing environments have created a requirement for spatial- and temporal-aware access control systems. Although temporal, spatial and spatio-temporal role-based acces...
Liang Chen, Jason Crampton
IPPS
2008
IEEE
15 years 7 months ago
Providing security to the Desktop Data Grid
Volunteer Computing is becoming a new paradigm not only for the Computational Grid, but also for institutions using production-level Data Grids because of the enormous storage pot...
Jesus Luna, Michail Flouris, Manolis Marazakis, An...