Sciweavers

1573 search results - page 125 / 315
» Strong User Authentication
Sort
View
DBSEC
2007
116views Database» more  DBSEC 2007»
15 years 3 months ago
Provably-Secure Schemes for Basic Query Support in Outsourced Databases
In this paper, we take a closer look at the security of outsourced databases (aka Database-as-the-Service or DAS), a topic of emerging importance. DAS allows users to store sensit...
Georgios Amanatidis, Alexandra Boldyreva, Adam O'N...
SIGCOMM
2010
ACM
15 years 2 months ago
Fived: a service-based architecture implementation to innovate at the endpoints
Security functions such as access control, encryption and authentication are typically left up to applications on the modern Internet. There is no unified system to implement thes...
D. J. Capelis, Darrell D. E. Long
IAJIT
2010
133views more  IAJIT 2010»
15 years 11 days ago
Improving web services security models
: Web services are considered one of the main technologies which emerged in recent years, they provide an application integration technology that allows business applications to co...
Sawsan Abu-Taleb, Hossam Mustafa
85
Voted
AIED
2007
Springer
15 years 8 months ago
Pedagogical Agents Trying on a Caring Mentor Role
: We describe the design and evaluation of an affective pedagogical agent persona for Intelligent Tutoring Systems. The goal of our research was to develop an agent embodying a per...
Konstantin Zakharov, Antonija Mitrovic, Lucy Johns...
ICAC
2006
IEEE
15 years 7 months ago
The Making of SimEAC
— In this short paper, we give a brief overview a simulation environment, SimEAC, which was designed for testing algorithms with strong autonomic features. SimEAC enables a user ...
David Chisnall, Min Chen