Sciweavers

3451 search results - page 88 / 691
» Security of Backup Data
Sort
View
INFOCOM
2007
IEEE
15 years 10 months ago
A Framework for Measuring and Predicting the Impact of Routing Changes
— Routing dynamics heavily influence Internet data plane performance. Existing studies only narrowly focused on a few destinations and did not consider the predictability of the...
Ying Zhang, Zhuoqing Morley Mao, Jia Wang
DBSEC
2008
137views Database» more  DBSEC 2008»
15 years 5 months ago
Towards Automation of Testing High-Level Security Properties
Abstract. Many security problems only become apparent after software is deployed, and in many cases a failure has occurred prior to the awareness of the problem. Although many woul...
Aiman Hanna, Hai Zhou Ling, Jason Furlong, Mourad ...
KDD
2010
ACM
203views Data Mining» more  KDD 2010»
15 years 8 months ago
Collusion-resistant privacy-preserving data mining
Recent research in privacy-preserving data mining (PPDM) has become increasingly popular due to the wide application of data mining and the increased concern regarding the protect...
Bin Yang, Hiroshi Nakagawa, Issei Sato, Jun Sakuma
TRIDENTCOM
2008
IEEE
15 years 10 months ago
A case study in testing a network security algorithm
Several difficulties arise when testing network security algorithms. First, using network data captured at a router does not guarantee that any instances of the security event of...
Carrie Gates
136
Voted
ICDCSW
2007
IEEE
15 years 10 months ago
Survey of Six Myths and Oversights about Distributed Hash Tables' Security
Distributed Hash Tables (DHT) was not designed to be secure against malicious users. But some secure systems like trust and reputation management algorithms trust DHT with their d...
Sylvain Dahan, Mitsuhisa Sato