Noticias y opinión
pting sensitive data that is not retrievable in its original form without accessing encryption keys. They are also using Chinese Wall, which is a set of policies that give access to information based on previously viewed data.
The scientists are using prototype systems that can store semantic web data in an encrypted form and query it securely using a web service that provides reliable capacity in the cloud. They have also introduced secure software and hardware attached to a database system that performs security functions.
Assured information sharing in cloud computing is daunting, but Thuraisingham and her team are creating ...
Contribute your own Squeeze Artwork and it may become the default background for the next version of Debian.
The project aims to develop and evolve a set of Eclipse-based tools for EGL in an effort to boost backing for the business app programming language
Email and network software for iPhone and Android on show
Reliable and environmentall friendly power sources
Spanning the Android
The Next-Generation IPS
New Crypto-Cracking Tool To Target Databases
Microsoft Offers Developers Cloud Security Tips
Más de la mitad cree que aportan comodidad y casi un 30% que aportan seguridad
People in rural areas may gain more wireless airspace from the shutdown of analog television.
Road map for VP8 codec improvements laid bare.
First NetBeans release under Oracle; focus on JavaFX