Sciweavers

688 search results - page 115 / 138
» A Calculus for Access Control in Distributed Systems
Sort
View
COLCOM
2008
IEEE
14 years 3 months ago
Defending against Attribute-Correlation Attacks in Privacy-Aware Information Brokering
Nowadays, increasing needs for information sharing arise due to extensive collaborations among organizations. Organizations desire to provide data access to their collaborators whi...
Fengjun Li, Bo Luo, Peng Liu, Anna Cinzia Squiccia...
HPCA
1996
IEEE
14 years 1 months ago
Protected, User-Level DMA for the SHRIMP Network Interface
Traditional DMA requires the operating system to perform many tasks to initiate a transfer, with overhead on the order of hundreds or thousands of CPU instructions. This paper des...
Matthias A. Blumrich, Cezary Dubnicki, Edward W. F...
WWW
2010
ACM
14 years 4 months ago
Object views: fine-grained sharing in browsers
Browsers do not currently support the secure sharing of JavaScript objects between principals. We present this problem as the need for object views, which are consistent and contr...
Leo A. Meyerovich, Adrienne Porter Felt, Mark S. M...
SIGCOMM
2009
ACM
14 years 3 months ago
Virtual individual servers as privacy-preserving proxies for mobile devices
People increasingly generate content on their mobile devices and upload it to third-party services such as Facebook and Google Latitude for sharing and backup purposes. Although t...
Ramón Cáceres, Landon P. Cox, Harold...
P2P
2003
IEEE
130views Communications» more  P2P 2003»
14 years 2 months ago
Peer-to-Peer Wireless LAN Consortia: Economic Modeling and Architecture
Abstract—In this paper we explore the incentive and architectural issues that arise in Consortia of Peer-to-Peer Wireless Local Area Networks. A P2P WLAN Consortium (PWC) is a co...
Panayotis Antoniadis, Costas Courcoubetis, Elias C...