Sciweavers

2560 search results - page 386 / 512
» Securing VO Management
Sort
View
ICICS
2007
Springer
15 years 8 months ago
Time and Space Efficient Algorithms for Two-Party Authenticated Data Structures
Authentication is increasingly relevant to data management. Data is being outsourced to untrusted servers and clients want to securely update and query their data. For example, in ...
Charalampos Papamanthou, Roberto Tamassia
123
Voted
ACSAC
2001
IEEE
15 years 8 months ago
Architecture and Applications for a Distributed Embedded Firewall
The distributed firewall is an important new line of network defense. It provides fine-grained access control to augment the protections afforded by the traditional perimeter fire...
Charles Payne, Tom Markham
ACSAC
2001
IEEE
15 years 8 months ago
Genoa TIE, Advanced Boundary Controller Experiment
This document describes experimentation performed as part of the Genoa Technology Integration Experiment (TIE). Achieved in two phases, the overarching assertion of the Genoa TIE ...
Eric Monteith
CARDIS
2010
Springer
159views Hardware» more  CARDIS 2010»
15 years 7 months ago
Modeling Privacy for Off-Line RFID Systems
This paper establishes a novel model for RFID schemes where readers are not continuously connected to the back office, but only periodically. Furthermore, adversaries are not only ...
Flavio D. Garcia, Peter van Rossum
CIKM
2008
Springer
15 years 6 months ago
Efficient techniques for document sanitization
Sanitization of a document involves removing sensitive information from the document, so that it may be distributed to a broader audience. Such sanitization is needed while declas...
Venkatesan T. Chakaravarthy, Himanshu Gupta, Prasa...