Trusted storage systems and methods

U Maheshwari, R Vingralek, WO Sibert - US Patent 7,752,455, 2010 - Google Patents
5,713,018 A 1/1998 Chan 5,794.252 A 8/1998 Bailey et al. 5,826,268 A 10, 1998 Schaefer
et al. 5,862.357 A 1/1999 Hagersten et al. 5,892,900 A 4/1999 Ginter et al. 5,910,987 A 6 …

Delivery of license information using a short messaging system protocol in a closed content distribution system

W Yen, J Princen, R Lo, P Srinivasan - US Patent 7,779,482, 2010 - Google Patents
Delivery of licenses in a closed distribution system including a playback device and secure
processor. The secure processor allows only use of authorized content, and the playback …

Using hypervisors to secure commodity operating systems

D Lie, L Litty - Proceedings of the fifth ACM workshop on Scalable …, 2010 - dl.acm.org
Hypervisors are an excellent tool for increasing the security of commodity software against
attack. In this paper, we discuss some of the lessons and insights we gained from designing …

Trusted storage systems and methods

U Maheshwari, R Vingralek, WO Sibert - US Patent 7,681,240, 2010 - Google Patents
Abstract Systems and methods are disclosed for providing a trusted database system that
leverages a small amount of trusted storage to secure a larger amount of untrusted storage …

Reconstruction of falsified computer logs for digital forensics investigations

M Tang, C Fidge - Information Security 2010: Proceedings of the …, 2010 - eprints.qut.edu.au
Digital forensics investigations aim to find evidence that helps confirm or disprove a
hypothesis about an alleged computer-based crime. However, the ease with which …

Investigation on effectiveness of a prefabricated vertical drain during cyclic loading

B Indraratna, J Ni… - IOP Conference Series …, 2010 - iopscience.iop.org
The effectiveness of prefabricated vertical drains (PVDs) in enhancing the stability of soft
soils during cyclic loading was investigated using triaxial cyclic loading tests. Both …

[PDF][PDF] Remote Policy Enforcement Using Java Virtual Machine

SK Nair - 2010 - research.vu.nl
As the reach and power of the Internet and networked systems widen, and thanks to the
emergence of paradigm shifting technologies and delivery models like Web Services (WS) …

Secure coprocessor-based private information retrieval without periodical preprocessing

P Wang, H Wang, J Pieprzyk - 2010 - ro.uow.edu.au
Abstract Early works on Private Information Retrieval (PIR) focused on minimizing the
necessary communication overhead. They seemed to achieve this goal but at the expense …

Towards multi-modal context recognition for hearing instruments

B Tessendorf, A Bulling, D Roggen… - International …, 2010 - ieeexplore.ieee.org
Current hearing instruments (HI) only rely on auditory scene analysis to adapt to the
situation of the user. It is for this reason that these systems are limited in the number and …