Sciweavers

3452 search results - page 575 / 691
» Secure Data Outsourcing
Sort
View
78
Voted
TCC
2005
Springer
102views Cryptology» more  TCC 2005»
15 years 6 months ago
Toward Privacy in Public Databases
Abstract. We initiate a theoretical study of the census problem. Informally, in a census individual respondents give private information to a trusted party (the census bureau), who...
Shuchi Chawla, Cynthia Dwork, Frank McSherry, Adam...
108
Voted
EMSOFT
2004
Springer
15 years 6 months ago
Garbage collection for embedded systems
Security concerns on embedded devices like cellular phones make Java an extremely attractive technology for providing third-party and user-downloadable functionality. However, gar...
David F. Bacon, Perry Cheng, David Grove
111
Voted
ICBA
2004
Springer
143views Biometrics» more  ICBA 2004»
15 years 6 months ago
Externalized Fingerprint Matching
The 9/11 tragedy triggered an increased interest in biometric passports. According to several sources [2], the electronic ID market is expected to increase by more than 50% per ann...
Claude Barral, Jean-Sébastien Coron, David ...
86
Voted
VLDB
2004
ACM
105views Database» more  VLDB 2004»
15 years 6 months ago
Tamper Detection in Audit Logs
Audit logs are considered good practice for business systems, and are required by federal regulations for secure systems, drug approval data, medical information disclosure, fina...
Richard T. Snodgrass, Shilong (Stanley) Yao, Chris...
96
Voted
HICSS
2010
IEEE
216views Biometrics» more  HICSS 2010»
15 years 6 months ago
A Virtualization Architecture for In-Depth Kernel Isolation
Recent advances in virtualization technologies have sparked a renewed interest in the use of kernel and process virtualization as a security mechanism to enforce resource isolatio...
Jiang Wang, Sameer Niphadkar, Angelos Stavrou, Anu...