Sciweavers

393 search results - page 28 / 79
» Securing Grid Data Using Mandatory Access Controls
Sort
View
DELOS
2004
14 years 11 months ago
Peer-to-Peer Overlays and Data Integration in a Life Science Grid
Databases and Grid computing are a good match. With the service orientation of Grid computing, the complexity of maintaining and integrating databases can be kept away from the act...
Curt Cramer, Andrea Schafferhans, Thomas Fuhrmann
SP
2007
IEEE
183views Security Privacy» more  SP 2007»
15 years 4 months ago
Ciphertext-Policy Attribute-Based Encryption
In several distributed systems a user should only be able to access data if a user posses a certain set of credentials or attributes. Currently, the only method for enforcing such...
John Bethencourt, Amit Sahai, Brent Waters
SACMAT
2009
ACM
15 years 4 months ago
Working set-based access control for network file systems
Securing access to files is an important and growing concern in corporate environments. Employees are increasingly accessing files from untrusted devices, including personal hom...
Stephen Smaldone, Vinod Ganapathy, Liviu Iftode
DOLAP
2000
ACM
15 years 2 months ago
Towards OLAP Security Design - Survey and Research Issues
With the use of data warehousing and online analytical processing (OLAP) for decision support applications new security issues arise. The goal of this paper is to introduce an OLA...
Torsten Priebe, Günther Pernul
TPDS
1998
94views more  TPDS 1998»
14 years 9 months ago
Access Control and Signatures via Quorum Secret Sharing
—We suggest a method of controlling the access to a secure database via quorum systems. A quorum system is a collection of sets (quorums) every two of which have a nonempty inter...
Moni Naor, Avishai Wool