Sciweavers

653 search results - page 64 / 131
» Addressing interoperability issues in access control models
Sort
View
PET
2004
Springer
14 years 1 months ago
Protecting User Data in Ubiquitous Computing: Towards Trustworthy Environments
Abstract. In a Ubiquitous Computing environment, sensors are actively collecting data, much of which can be very sensitive. Data will often be streaming at high rates (video and au...
Yitao Duan, John F. Canny
PROVSEC
2009
Springer
14 years 2 months ago
Self-enforcing Private Inference Control
Private inference control enables simultaneous enforcement of inference control and protection of users’ query privacy. Private inference control is a useful tool for database ap...
Yanjiang Yang, Yingjiu Li, Jian Weng, Jianying Zho...
NDSS
2000
IEEE
14 years 13 days ago
Secure Virtual Enclaves: Supporting Coalition Use of Distributed Application Technologies
The Secure Virtual Enclaves (SVE) collaboration infrastructure allows multiple organizations to share their distributed application objects, while respecting organizational autono...
Deborah Shands, Richard Yee, Jay Jacobs, E. John S...
JNW
2008
97views more  JNW 2008»
13 years 8 months ago
Secure Multicast in WiMAX
Abstract-- Multicast enables efficient large-scale content distribution and has become more and more popular in network service. Security is a critical issue for multicast because ...
Sen Xu, Chin-Tser Huang, Manton M. Matthews
HPDC
1996
IEEE
14 years 7 days ago
A Federated Model for Scheduling in Wide-Area Systems
In this paper a model for scheduling in wide-area systems is described. The model is federated and utilizes a collection of local site schedulers that control the use of their res...
Jon B. Weissman, Andrew S. Grimshaw