Sciweavers

4004 search results - page 790 / 801
» Selecting an Approach to Designing Group Support Systems
Sort
View
CCS
2010
ACM
14 years 9 months ago
Hierarchical attribute-based encryption for fine-grained access control in cloud storage services
Cloud computing, as an emerging computing paradigm, enables users to remotely store their data into a cloud so as to enjoy scalable services on-demand. Especially for small and me...
Guojun Wang, Qin Liu, Jie Wu
WISEC
2010
ACM
14 years 9 months ago
Mobile user location-specific encryption (MULE): using your office as your password
Data breaches due to stolen laptops are a major problem. Solutions exist to secure sensitive files on laptops, but are rarely deployed because users view them as inconvenient. Thi...
Ahren Studer, Adrian Perrig
100
Voted
INTERNET
2007
113views more  INTERNET 2007»
14 years 9 months ago
REST Eye for the SOA Guy
it’s hardly Earth-shattering: abstracting your business services and separating them from your applications can yield an overall system that’s easier to build, maintain, and ex...
Steve Vinoski
INTERNET
2002
175views more  INTERNET 2002»
14 years 9 months ago
Web Services Interaction Models, Part 1: Current Practice
of abstractions a middleware system makes available to applications, they figure prominently in determining the breadth and variety of application integration that the middleware s...
Steve Vinoski
SIGMOD
2012
ACM
383views Database» more  SIGMOD 2012»
13 years 3 days ago
Dynamic workload driven data integration in tableau
Tableau is a commercial business intelligence (BI) software tool that supports interactive, visual analysis of data. Armed with a visual interface to data and a focus on usability...
Kristi Morton, Ross Bunker, Jock D. Mackinlay, Rob...