Sciweavers

2560 search results - page 333 / 512
» Securing VO Management
Sort
View
150
Voted
FAST
2011
14 years 8 months ago
Reliably Erasing Data from Flash-Based Solid State Drives
Reliably erasing data from storage media (sanitizing the media) is a critical component of secure data management. While sanitizing entire disks and individual files is well-unde...
Michael Yung Chung Wei, Laura M. Grupp, Frederick ...
SIGMOD
2011
ACM
177views Database» more  SIGMOD 2011»
14 years 7 months ago
NetTrails: a declarative platform for maintaining and querying provenance in distributed systems
We demonstrate NetTrails, a declarative platform for maintaining and interactively querying network provenance in a distributed system. Network provenance describes the history an...
Wenchao Zhou, Qiong Fei, Shengzhi Sun, Tao Tao, An...
229
Voted
IHI
2012
285views Healthcare» more  IHI 2012»
14 years 17 days ago
Towards HIPAA-compliant healthcare systems
In healthcare domain, there is a gap between healthcare systems and government regulations such as the Health Insurance Portability and Accountability Act (HIPAA). The violations ...
Ruoyu Wu, Gail-Joon Ahn, Hongxin Hu
ESORICS
2009
Springer
16 years 5 months ago
User-Centric Handling of Identity Agent Compromise
Digital identity credentials are a key enabler for important online services, but widespread theft and misuse of such credentials poses serious risks for users. We believe that an ...
Daisuke Mashima, Mustaque Ahamad, Swagath Kannan
IDTRUST
2010
ACM
15 years 12 months ago
Computational techniques for increasing PKI policy comprehension by human analysts
Natural-language policies found in X.509 PKI describe an organization’s stated policy as a set of requirements for trust. The widespread use of X.509 underscores the importance ...
Gabriel A. Weaver, Scott A. Rea, Sean W. Smith