Sciweavers

3451 search results - page 103 / 691
» Security of Backup Data
Sort
View
ISI
2004
Springer
15 years 9 months ago
The Architecture of the Cornell Knowledge Broker
Intelligence applications have to process massive amounts of data in order to extract relevant information. This includes archived historical data as well as continuously arriving ...
Alan J. Demers, Johannes Gehrke, Mirek Riedewald
JTAER
2010
121views more  JTAER 2010»
15 years 2 months ago
A Semantic Data Validation Service for Web Applications
An Input validation can be a critical issue. Typically, a little attention is paid to it in a web development project, because overenthusiastic validation can tend to cause failur...
Shadi Aljawarneh, Faisal Alkhateeb, Eslam Al Magha...
140
Voted
CCS
2009
ACM
16 years 4 months ago
PBES: a policy based encryption system with application to data sharing in the power grid
In distributed systems users need the ability to share sensitive content with multiple other recipients based on their ability to satisfy arbitrary policies. One such system is el...
Rakeshbabu Bobba, Himanshu Khurana, Musab AlTurki,...
CCS
2004
ACM
15 years 9 months ago
Attacking and repairing the winZip encryption scheme
WinZip is a popular compression utility for Microsoft Windows computers, the latest version of which is advertised as having “easy-to-use AES encryption to protect your sensitiv...
Tadayoshi Kohno
111
Voted
IADIS
2003
15 years 5 months ago
DENOFAS: A Vulnerability Assessment Tool
This paper describes the development of a software tool for detection of vulnerabilities in networked systems, using public available security resources. Our tool builds is knowle...
Rui Costa Cardoso, Mário M. Freire