Sciweavers

2560 search results - page 443 / 512
» Securing VO Management
Sort
View
PKC
2007
Springer
144views Cryptology» more  PKC 2007»
15 years 10 months ago
Traceable Ring Signature
Abstract. The ring signature allows a signer to leak secrets anonymously, without the risk of identity escrow. At the same time, the ring signature provides great flexibility: No ...
Eiichiro Fujisaki, Koutarou Suzuki
VLDB
2007
ACM
119views Database» more  VLDB 2007»
15 years 10 months ago
Integrity Auditing of Outsourced Data
An increasing number of enterprises outsource their IT services to third parties who can offer these services for a much lower cost due to economy of scale. Quality of service is ...
Min Xie, Haixun Wang, Jian Yin, Xiaofeng Meng
CCGRID
2006
IEEE
15 years 10 months ago
SSB : A Grid-based Infrastructure for HLA Systems
Service Oriented EXtensible Modeling and Simulation Supporting Environment Architecture (SO-XMSSEA) is presented based on XMSF thinking and the new technology development of web s...
Xu Li-juan, Peng Xiao-yuan
IDEAS
2006
IEEE
152views Database» more  IDEAS 2006»
15 years 10 months ago
Querying Encrypted XML Documents
This paper proposes techniques to query encrypted XML documents. Such a problem predominantly occurs in “Database as a Service” (DAS) architectures, where a client may outsour...
Ravi Chandra Jammalamadaka, Sharad Mehrotra
IRI
2006
IEEE
15 years 10 months ago
Toward component non-functional interoperability analysis: A UML-based and goal-oriented approach
Component interoperability is the ability of two or more components to cooperate despite their differences in functional and non-functional aspects such as security or performanc...
Sam Supakkul, Ebenezer A. Oladimeji, Lawrence Chun...