Search results for "Client-side"

showing 4 items of 4 documents

Self-validating bundles for flexible data access control

2016

Modern cloud-based services offer free or low-cost content sharing with significant advantages for the users but also new issues in privacy and security. To protect sensitive contents (i.e., copyrighted, top secret, and personal data) from the unauthorized access, sophisticated access management systems or/and decryption schemes have been proposed, generally based on trusted applications at client side. These applications work also as access controllers, verifying specific permissions and restrictions accessing user’s resources. We propose secure bundles (S-bundles), which encapsulate a behavioral model (provided as bytecode) to define versatile stand-alone access controllers and encoding/d…

021110 strategic defence & security studiesbundle information-centric security access policy bytecodeComputer sciencebusiness.industrySettore ING-INF/03 - Telecomunicazioni0211 other engineering and technologies020207 software engineeringAccess controlCloud computing02 engineering and technologyClient-sideComputer securitycomputer.software_genreMetadataData access0202 electrical engineering electronic engineering information engineeringData Protection Act 1998businesscomputerAccess structure
researchProduct

H2S: A Secure and Efficient Data Aggregative Retrieval Scheme in Unattended Wireless Sensor Networks

2009

In unattended wireless sensor networks, data are stored locally and retrieved on demand. To efficiently transmit the collector’s retrieval results, data are aggregated along being forwarded. The data confidentiality and integrity should be protected at the intermediate nodes. End-to-end encryption or hop-by-hop encryption based schemes are not efficient. Straightforward homomorphic encryption based scheme is not compromise resilient. To achieve all the desires, we propose a scheme - H2S by making use of both homomorphic secret sharing and homomorphic encryption. The security and efficiency of our scheme are justified by extensive analysis.

Homomorphic secret sharingComputer sciencebusiness.industryClient-side encryptionEncryptioncomputer.software_genreMultiple encryptionProbabilistic encryptionComputer Science::MultimediaComputer Science::Networking and Internet Architecture40-bit encryptionAttribute-based encryptionOn-the-fly encryptionbusinesscomputerComputer Science::Cryptography and SecurityComputer network2009 Fifth International Conference on Information Assurance and Security
researchProduct

NVMM-Oriented Hierarchical Persistent Client Caching for Lustre

2021

In high-performance computing (HPC), data and metadata are stored on special server nodes and client applications access the servers’ data and metadata through a network, which induces network latencies and resource contention. These server nodes are typically equipped with (slow) magnetic disks, while the client nodes store temporary data on fast SSDs or even on non-volatile main memory (NVMM). Therefore, the full potential of parallel file systems can only be reached if fast client side storage devices are included into the overall storage architecture. In this article, we propose an NVMM-based hierarchical persistent client cache for the Lustre file system (NVMM-LPCC for short). NVMM-LPC…

Record lockingComputer science020206 networking & telecommunications020207 software engineering02 engineering and technologyClient-sidecomputer.software_genreMetadataHardware and ArchitectureServerHierarchical storage managementScalability0202 electrical engineering electronic engineering information engineeringOperating systemLustre (file system)NamespacecomputerACM Transactions on Storage
researchProduct

A Distributed approach to the Remote Control and Programming Improvement

2006

The remote control of industrial plants through networks is becoming very important nowadays but it involves several issues that can degrade the performance and usability of the remote plant. This paper presents a distributed architecture improving a remote programming system which allows users to control and to program a plant remotely. The control system is based on a client/server architecture with many user interfaces that control the plant. The remote programming language is a mix of Java and client/server protocol in order to simplify the developing and to avoid the protocol/language translation. In order to obtain more efficiency, the program is developed in the client side and it is…

Database serverJavaComputer sciencebusiness.industryDistributed computingUsabilityRemote evaluationClient-sidecomputer.software_genrelaw.inventionClient–server modelRemote procedure calllawOperating systemUser interfacebusinesscomputerProtocol (object-oriented programming)Remote controlcomputer.programming_languageIECON 2006 - 32nd Annual Conference on IEEE Industrial Electronics
researchProduct