Sciweavers

2429 search results - page 365 / 486
» Using Aspects to Design a Secure System
Sort
View
EUROSYS
2009
ACM
15 years 7 months ago
Privacy-preserving browser-side scripting with BFlow
Some web sites provide interactive extensions using browser scripts, often without inspecting the scripts to verify that they are benign and bug-free. Others handle users’ conď¬...
Alexander Yip, Neha Narula, Maxwell N. Krohn, Robe...
ACNS
2008
Springer
94views Cryptology» more  ACNS 2008»
15 years 4 months ago
Restricted Queries over an Encrypted Index with Applications to Regulatory Compliance
Compliance storage is an increasingly important area for businesses faced with a myriad of new document retention regulations. Today, businesses have turned to Write-One Read Many ...
Nikita Borisov, Soumyadeb Mitra
CF
2007
ACM
15 years 2 months ago
Accelerating memory decryption and authentication with frequent value prediction
This paper presents a novel architectural technique to hide fetch latency overhead of hardware encrypted and authenticated memory. A number of recent secure processor designs have...
Weidong Shi, Hsien-Hsin S. Lee
WWW
2004
ACM
15 years 10 months ago
E-learning personalization based on itineraries and long-term navigational behavior
In this paper we describe a practical framework for studying the navigational behavior of the users of an e-learning environment integrated in a virtual campus. The students navig...
Enric Mor, Julià Minguillón
IRI
2008
IEEE
15 years 4 months ago
Towards an integrated modeling and simulation framework for freight transportation in metropolitan areas
Freight transportation at distribution nodes such as marine ports, airports and rail yards has been putting tremendous environmental pressure in metropolitan areas. A prerequisite...
Qunzhi Zhou, Amol Bakshi, Viktor K. Prasanna, Rama...