Sciweavers

3451 search results - page 27 / 691
» Security of Backup Data
Sort
View
84
Voted
INFOCOM
2012
IEEE
13 years 3 days ago
STROBE: Actively securing wireless communications using Zero-Forcing Beamforming
Abstract—We present the design and experimental evaluation of Simultaneous TRansmission with Orthogonally Blinded Eavesdroppers (STROBE). STROBE is a cross-layer approach that ex...
Narendra Anand, Sung-Ju Lee, Edward W. Knightly
89
Voted
DSN
2006
IEEE
15 years 3 months ago
Designing dependable storage solutions for shared application environments
The costs of data loss and unavailability can be large, so businesses use many data protection techniques, such as remote mirroring, snapshots and backups, to guard against failur...
Shravan Gaonkar, Kimberly Keeton, Arif Merchant, W...
GLOBECOM
2010
IEEE
14 years 7 months ago
Peer-to-Peer Storage Systems: A Practical Guideline to be Lazy
Distributed and peer-to-peer storage systems are foreseen as an alternative to the traditional data centers and in-house backup solutions. In the past few years many peerto-peer st...
Frédéric Giroire, Julian Monteiro, S...
DEXAW
2009
IEEE
93views Database» more  DEXAW 2009»
15 years 1 months ago
The Secure Pipes and Filters Pattern
Many applications process or transform a stream of data. Such applications are organized as a sequence of different stages, which may be independent enough to be simultaneously car...
Eduardo B. Fernandez, Jorge L. Ortega-Arjona
TCS
2008
14 years 9 months ago
Security types for dynamic web data
We describe a type system for the Xd calculus of Gardner and Maffeis. An Xd-network is a network of locations, where each location consists of both a data tree (which contains scr...
Mariangiola Dezani-Ciancaglini, Silvia Ghilezan, J...