• Datalog

  • Referenced in 293 articles [sw20023]
  • application in data integration, information extraction, networking, program analysis, security, and cloud computing...
  • NetSolve

  • Referenced in 50 articles [sw01978]
  • benefitted from many enhancements like security services, data management faculties and distributed storage infrastructures. This...
  • PRINCE

  • Referenced in 69 articles [sw13240]
  • real-time security needs. Our cipher, named PRINCE, allows encryption of data within one clock...
  • SPINS

  • Referenced in 50 articles [sw02657]
  • SPINS has two secure building blocks: SNEP and µTESLA. SNEP includes: data confidentiality, two-party...
  • Binder

  • Referenced in 15 articles [sw26750]
  • system. Most existing securitylanguages encode security statements as schematized data structures,such as ACLs ... contrast, Binder is an openlogic-based security language that encodes security statements ascomponents of communicating...
  • KEM-DEM

  • Referenced in 60 articles [sw03093]
  • universally composable secure channel based on the KEM-DEM framework. For ISO standards on public ... Encapsulation Mechanism), and DEM (Data Encapsulation Mechanism), for formalizing and realizing one-directional hybrid encryption ... paper investigates a more general hybrid protocol, secure channel, using KEM and DEM, such that...
  • MINRES-QLP

  • Referenced in 28 articles [sw11181]
  • make problem data known to the solver but hidden and secure from other program units...
  • Sharemind

  • Referenced in 16 articles [sw22617]
  • privacy-preserving computations. Gathering and processing sensitive data is a difficult task. In fact, there ... this paper, we present a provably secure and efficient general-purpose computation system to address ... data processing that relies on share computing techniques. This is a standard way for securely...
  • BTSR

  • Referenced in 2 articles [sw02801]
  • BTSR: Secure data fusion and routing algorithm based on behavior trust In order to treat ... problem of routing security in wireless sensor network, data fusion event was both spatially ... trust was taken into account, a secure data fusion and routing algorithm based on behavior ... data fusion event. The simulation results show that BTSR is better than LEACH on security...
  • NVD

  • Referenced in 5 articles [sw15083]
  • standards based vulnerability management data represented using the Security Content Automation Protocol (SCAP). This data...
  • TFRP

  • Referenced in 3 articles [sw37089]
  • very important part of data security dealing with the protection of databases. Microaggregation...
  • Cryptfs

  • Referenced in 4 articles [sw42329]
  • Stackable Vnode Level Encryption File System. Data encryption has become an increasingly important factor ... work. Users seek a method of securing their data with maximum comfort and minimum additional...
  • SNAP

  • Referenced in 19 articles [sw09647]
  • computation or data transfer onto resources that meet requirements for performance, cost, security, or other...
  • ELmD

  • Referenced in 14 articles [sw20823]
  • almost parallelizable except that for associated data processing, the final block-cipher call is sequential ... this paper, we design a new online secure authenticated encryption, called ELmD or Encrypt-Linear ... completely (two-stage) parallel (even in associated data) and fully pipeline implementable. It also provides ... full privacy when associated data is not repeated. Like COPA, our construction is based...
  • eHIP

  • Referenced in 4 articles [sw01490]
  • authenticity and integrity of delivered data is indispensable for security-sensitive Wireless Sensor Networks ... provide heterogeneous mechanisms for different demands of security levels in CWSN to improve energy efficiency ... introduced to verify control messages and sensed data to prevent external attacks. These two authentication ... control messages and sensed data. However, because the security threat from compromised sensor nodes cannot...
  • Me-services

  • Referenced in 8 articles [sw01399]
  • services: A framework for secure & personalized discovery, composition and management of services in pervasive environments ... service discovery, service composition, data management, and trust based security in pervasive computing environments...
  • Laminar

  • Referenced in 3 articles [sw23077]
  • Language level solutions provide no guarantees against security violations on system resources, like files ... flow of information through fine-grained program data structures. This paper describes Laminar, the first ... heap-allocated objects. Programmers express security policies by labeling data with secrecy and integrity labels ... then access the labeled data in lexically scoped security regions. Laminar enforces the security policies...
  • G-Hadoop

  • Referenced in 12 articles [sw08480]
  • security framework in G-Hadoop for big data computing across distributed cloud data centres. MapReduce ... adequate programming model for large-scale data-intensive applications. The Hadoop framework is a well ... single cluster. This work proposes a new security model for G-Hadoop. The security model...
  • DataSecure

  • Referenced in 1 article [sw01944]
  • Securing sensitive data with the Ingrian DataSecure platform Recent high profile data thefts have shown ... defenses are not sufficient to secure important customer data. The damage caused by these thefts ... today an enterprise with poor data security may also find itself violating privacy legislation ... unauthorized data exposure by implementing column encryption in commercially available databases. Adding security...
  • Fable

  • Referenced in 6 articles [sw23081]
  • expressed by associating security labels with the data or actions they protect. Programmers define ... particular policy achieve their high-level security goals. Fable is flexible enough to implement...