Sciweavers

3452 search results - page 34 / 691
» Secure Data Outsourcing
Sort
View
173
Voted
IWSEC
2010
Springer
15 years 3 months ago
Security Metrics and Security Investment Models
Abstract. Planning information security investment is somewhere between art and science. This paper reviews and compares existing scientific approaches and discusses the relation ...
Rainer Böhme
CCS
2007
ACM
15 years 11 months ago
Provable data possession at untrusted stores
Giuseppe Ateniese, Randal C. Burns, Reza Curtmola,...
112
Voted
SP
2005
IEEE
15 years 10 months ago
Towards Constant Bandwidth Overhead Integrity Checking of Untrusted Data
Dwaine E. Clarke, G. Edward Suh, Blaise Gassend, A...
115
Voted
CCS
2010
ACM
15 years 5 months ago
Losing control of the internet: using the data plane to attack the control plane
Max Schuchard, Abedelaziz Mohaisen, Denis Foo Kune...
AIMS
2010
Springer
15 years 9 months ago
Scalable Service Performance Monitoring
Abstract. Dependable performance measurement is a common requirement for all on-line services. The ongoing tendency to outsource not only infrastructure, but also software parts to...
Idilio Drago, Aiko Pras