Sciweavers

415 search results - page 37 / 83
» A New RFID Privacy Model
Sort
View
OOPSLA
2005
Springer
14 years 2 months ago
CanonSketch and TaskSketch: innovative modeling tools for usage-centered design
Two experimental tools to support usage-centered design using l use cases and canonical abstract prototypes are described. The models and methods of usage-centered design are outl...
Larry L. Constantine, Pedro Campos
IJNSEC
2006
88views more  IJNSEC 2006»
13 years 8 months ago
Secure Internet Applications Based on Mobile Agents
The increasing importance of the Internet has motivated the exploration of new execution models based on mobile and dynamic entities to overcome the limits of the client/server mo...
Cungang Yang
CSFW
2004
IEEE
14 years 12 days ago
From Stack Inspection to Access Control: A Security Analysis for Libraries
We present a new static analysis for reviewing the security of libraries for systems, such as JVMs or the CLR, that rely on stack inspection for access control. We describe its im...
Frédéric Besson, Tomasz Blanc, C&eac...
AGENTS
1999
Springer
14 years 29 days ago
Shopbot Economics
Abstract. Shopbots are agents that search the Internet for information pertaining to the price and quality of goods or services. With the advent of shopbots, a dramatic reduction i...
Jeffrey O. Kephart, Amy R. Greenwald
ICDE
2010
IEEE
258views Database» more  ICDE 2010»
14 years 3 months ago
Anonymized Data: Generation, models, usage
Data anonymization techniques have been the subject of intense investigation in recent years, for many kinds of structured data, including tabular, item set and graph data. They e...
Graham Cormode, Divesh Srivastava