Sciweavers

1462 search results - page 32 / 293
» Conditional Access in Mobile Systems: Securing the Applicati...
Sort
View
CCS
2010
ACM
13 years 12 months ago
Apex: extending Android permission model and enforcement with user-defined runtime constraints
Android is the first mass-produced consumer-market open source mobile platform that allows developers to easily create applications and users to readily install them. However, giv...
Mohammad Nauman, Sohail Khan, Xinwen Zhang
TNC
2004
140views Education» more  TNC 2004»
13 years 10 months ago
Seamless Multimedia Communications in Heterogeneous Mobile Access Networks
With the advent of the new wireless technologies allowing for higher data rates, the provision of high quality multimedia services over the upcoming wireless and mobile networks i...
Pedro M. Ruiz, Juan A. Botía, Antonio F. G&...
DRM
2006
Springer
14 years 5 days ago
Securing sensitive content in a view-only file system
One of the most fundamental problems in computer security is protecting sensitive digital information from unauthorized disclosure. There are a number of challenges, such as spywa...
Kevin Borders, Xin Zhao, Atul Prakash
SIGMETRICS
2006
ACM
121views Hardware» more  SIGMETRICS 2006»
14 years 2 months ago
Transient analysis of tree-Like processes and its application to random access systems
A new methodology to assess transient performance measures of tree-like processes is proposed by introducing the concept of tree-like processes with marked time epochs. As opposed...
Jeroen Van Velthoven, Benny Van Houdt, Chris Blond...
CSREAPSC
2006
13 years 10 months ago
Mobile Access to Web Systems Using a Multi-device Interface Design Approach
- This paper uses and extends the ideas of a multi-device interface design approach from a previous work developing a framework for mobile access to web systems. It can adapt any d...
Rodrigo de Oliveira, Heloisa Vieira da Rocha