Sciweavers

3451 search results - page 172 / 691
» Security of Backup Data
Sort
View
144
Voted
B
2007
Springer
15 years 8 months ago
Security Policy Enforcement Through Refinement Process
Abstract. In the area of networks, a common method to enforce a security policy expressed in a high-level language is based on an ad-hoc and manual rewriting process [24]. We argue...
Nicolas Stouls, Marie-Laure Potet
131
Voted
CORR
2008
Springer
102views Education» more  CORR 2008»
15 years 4 months ago
SAFIUS - A secure and accountable filesystem over untrusted storage
We describe SAFIUS, a secure accountable file system that resides over an untrusted storage. SAFIUS provides strong security guarantees like confidentiality, integrity, prevention ...
V. Sriram, Ganesh M. Narayan, K. Gopinath
KDD
2012
ACM
205views Data Mining» more  KDD 2012»
13 years 7 months ago
Intrusion as (anti)social communication: characterization and detection
A reasonable definition of intrusion is: entering a community to which one does not belong. This suggests that in a network, intrusion attempts may be detected by looking for com...
Qi Ding, Natallia Katenka, Paul Barford, Eric D. K...
133
Voted
SAINT
2009
IEEE
15 years 11 months ago
Understanding the Challenges in Securing Internet Routing
The Internet routing system plays an essential role of glueing together tens of thousands of individual networks to create a global data delivery substrate. Over the years many ef...
Ricardo V. Oliveira, Mohit Lad, Lixia Zhang
ESORICS
2007
Springer
15 years 10 months ago
Encryption Techniques for Secure Database Outsourcing
Abstract. While the idea of database outsourcing is becoming increasingly popular, the associated security risks still prevent many potential users from deploying it. In particular...
Sergei Evdokimov, Oliver Günther