Sciweavers

3451 search results - page 19 / 691
» Security of Backup Data
Sort
View
91
Voted
FAST
2011
14 years 1 months ago
A Study of Practical Deduplication
We collected file system content data from 857 desktop computers at Microsoft over a span of 4 weeks. We analyzed the data to determine the relative efficacy of data deduplication...
Dutch T. Meyer, William J. Bolosky
92
Voted
ACSW
2007
14 years 11 months ago
Securing Grid Data Using Mandatory Access Controls
The main contribution of this paper is to investigate issues in using Mandatory Access Controls (MACs), namely those provided by SELinux, to secure application-level data. Particu...
Matthew Henricksen, William J. Caelli, Peter R. Cr...
INFOCOM
2012
IEEE
13 years 3 days ago
Secure top-k query processing via untrusted location-based service providers
Abstract—This paper considers a novel distributed system for collaborative location-based information generation and sharing which become increasingly popular due to the explosiv...
Rui Zhang 0007, Yanchao Zhang, Chi Zhang
WPES
2003
ACM
15 years 2 months ago
Leveraging the "Multi" in secure multi-party computation
Secure Multi-Party Computation enables parties with private data to collaboratively compute a global function of their private data, without revealing that data. The increase in s...
Jaideep Vaidya, Chris Clifton
SIGMOD
2010
ACM
227views Database» more  SIGMOD 2010»
15 years 2 months ago
SecureBlox: customizable secure distributed data processing
We present SecureBlox, a declarative system that unifies a distributed query processor with a security policy framework. SecureBlox decouples security concerns from system speci...
William R. Marczak, Shan Shan Huang, Martin Braven...