Sciweavers

270 search results - page 23 / 54
» Authorization of User Profile Access in Identity Management
Sort
View
IKE
2003
13 years 9 months ago
Access Control System Using Web Services for XML Messaging Systems
We describe the design of an Access Control System using Web Services for information and content management. In this paper we described the solution for control mechanism of the ...
Ali Kaplan, Ahmet E. Topcu, Marlon E. Pierce, Geof...
DIM
2005
ACM
13 years 9 months ago
Pseudonym management using mediated identity-based cryptography
Mobile Location-Based Services (LBS) have raised privacy concerns amongst mobile phone users who may need to supply their identity and location information to untrustworthy third ...
Thibault Candebat, Cameron Ross Dunne, David T. Gr...
CI
2004
99views more  CI 2004»
13 years 7 months ago
Purpose-Based Expert Finding in a Portfolio Management System
Most of the research inthe area of expert finding focuses on creating and maintaining centralized directories of experts' profiles, which users can search on demand. However, ...
Xiaolin Niu, Gordon I. McCalla, Julita Vassileva
MOBISYS
2006
ACM
14 years 7 months ago
WiFiProfiler: cooperative diagnosis in wireless LANs
While 802.11-based wireless hotspots are proliferating, users often have little recourse when the network does not work or performs poorly for them. They are left trying to manual...
Ranveer Chandra, Venkata N. Padmanabhan, Ming Zhan...
WISEC
2010
ACM
13 years 7 months ago
Mobile user location-specific encryption (MULE): using your office as your password
Data breaches due to stolen laptops are a major problem. Solutions exist to secure sensitive files on laptops, but are rarely deployed because users view them as inconvenient. Thi...
Ahren Studer, Adrian Perrig