Sciweavers

1347 search results - page 97 / 270
» Towards a Secure Data Stream Management System
Sort
View
ACSAC
2010
IEEE
15 years 2 months ago
Keeping data secret under full compromise using porter devices
We address the problem of confidentiality in scenarios where the attacker is not only able to observe the communication between principals, but can also fully compromise the commu...
Christina Pöpper, David A. Basin, Srdjan Capk...
FAST
2003
15 years 5 months ago
Data Staging on Untrusted Surrogates
We show how untrusted computers can be used to facilitate secure mobile data access. We discuss a novel architecture, data staging, that improves the performance of distributed ï¬...
Jason Flinn, Shafeeq Sinnamohideen, Niraj Tolia, M...
ISADS
1999
IEEE
15 years 8 months ago
A Secure Key Registration System based on Proactive Secret-Sharing Scheme
We designed a secure key registration system based on the proactive secret-sharing scheme. A user can register important data such as a session key to a distributed system in a (t...
Masayuki Numao
IADT
1998
100views more  IADT 1998»
15 years 5 months ago
Task Handling in Workflow Management Systems
Work ow management systems aim to automate the execution of business processes. One of the objectives of the work ow systems is to include the already existing applications such a...
Pinar Karagoz, Sena Nural Arpinar, Pinar Koksal, N...
SIGMOD
2010
ACM
436views Database» more  SIGMOD 2010»
15 years 4 months ago
Pluggable personal data servers
An increasing amount of personal data is automatically gathered on servers by administrations, hospitals and private companies while several security surveys highlight the failure...
Nicolas Anciaux, Luc Bouganim, Yanli Guo, Philippe...