Sciweavers

848 search results - page 75 / 170
» Secure Information Flow for Distributed Systems
Sort
View
KES
2008
Springer
14 years 10 months ago
Fast Cryptographic Privacy Preserving Association Rules Mining on Distributed Homogenous Data Base
Privacy is one of the most important properties of an information system must satisfy. In which systems the need to share information among different, not trusted entities, the pro...
Mahmoud Hussein, Ashraf El-Sisi, Nabil A. Ismail
EDBT
2004
ACM
139views Database» more  EDBT 2004»
15 years 12 months ago
GRIDS, Databases, and Information Systems Engineering Research
GRID technology, emerging in the late nineties, has evolved from a metacomputing architecture towards a pervasive computation and information utility. However, the architectural de...
Keith G. Jeffery
IEEEIAS
2009
IEEE
14 years 9 months ago
An Improved Scheme of Single Sign-on Protocol
In order to avoid security threats caused by password attack and replay attack in single sign-on protocal, the most methods on sovling these issues are making use of complicated te...
Yang Jian
ISCIS
2003
Springer
15 years 5 months ago
Design of a Log Server for Distributed and Large-Scale Server Environments
Collection, storage and analysis of multiple hosts’ audit trails in a distributed manner are known as a major requirement, as well as a major challenge for enterprise-scale compu...
Attila Özgit, Burak Dayioglu, Erhan Anuk, Ina...
DIM
2008
ACM
15 years 1 months ago
Quantifying the security of preference-based authentication
We describe a technique aimed at addressing longstanding problems for password reset: security and cost. In our approach, users are authenticated using their preferences. Experime...
Markus Jakobsson, Liu Yang, Susanne Wetzel