Sciweavers

3451 search results - page 20 / 691
» Security of Backup Data
Sort
View
ETFA
2005
IEEE
15 years 3 months ago
A security architecture for data privacy and security
Data access and software exchange are often achieved over insecure networks such as the public Internet. System designers are therefore forced to be proactive with regard to verif...
Alfred C. Weaver
CAU
2004
192views Cryptology» more  CAU 2004»
14 years 11 months ago
Encrypted? Randomised? Compromised? (When Cryptographically Secured Data is Not Secure)
Protecting data is not simply a case of encrypt and forget: even data with full cryptographic confidentiality and integrity protection can still be subject to information leakage. ...
Mike Bond, Jolyon Clulow
DMDW
2000
118views Management» more  DMDW 2000»
14 years 11 months ago
View security as the basis for data warehouse security
Access. permissions in a data warehouse are currently managed in a separate world from the sources' policies. The consequences are inconsistencies, slow response to change, a...
Arnon Rosenthal, Edward Sciore
NPC
2005
Springer
15 years 3 months ago
TCP-ABC: From Multiple TCP Connections to Atomic Broadcasting
In this paper, we proposed a novel scheme, named as TCP-ABC, which replicates the server side TCP connections among multiple server nodes of a cluster. By guaranteeing atomic reque...
Zhiyuan Shao, Hai Jin, Wenbin Jiang, Bin Cheng
IEEEARES
2010
IEEE
15 years 4 months ago
Patterns for Secure Boot and Secure Storage in Computer Systems
—Trusted Computing aims at enhancing the security of IT systems by using a combination of trusted hardware and software components to provide security guarantees. This includes s...
Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy