Sciweavers

178 search results - page 18 / 36
» Dependability Arguments with Trusted Bases
Sort
View
TRUSTBUS
2004
Springer
14 years 1 months ago
Large-Scale Pay-As-You-Watch for Unicast and Multicast Communications
This paper addresses the problem of pay-as-you-watch services over unicast and multicast communications. For each communication model, we present two solutions, non-verifiable and...
Antoni Martínez-Ballesté, Francesc S...
ICNP
2009
IEEE
13 years 6 months ago
Quality of Name Resolution in the Domain Name System
The Domain Name System (DNS) is integral to today's Internet. Name resolution for a domain is often dependent on servers well outside the control of the domain's owner. I...
Casey T. Deccio, Chao-Chih Chen, Jeff Sedayao, Kri...
ICDCS
2009
IEEE
14 years 5 months ago
CAP: A Context-Aware Privacy Protection System for Location-Based Services
We address issues related to privacy protection in location-based services (LBS). Most existing research in this field either requires a trusted third-party (anonymizer) or uses ...
Aniket Pingley, Wei Yu, Nan Zhang 0004, Xinwen Fu,...
DASC
2006
IEEE
14 years 2 months ago
Analysing Stream Authentication Protocols in Autonomous Agent-Based Systems
Abstract— In stream authentication protocols used for largescale data dissemination in autonomuous systems, authentication is based on the timing of the publication of keys, and ...
Mehmet A. Orgun, Ji Ma, Chuchang Liu, Guido Govern...
SIGKDD
2010
159views more  SIGKDD 2010»
13 years 7 months ago
Providing K-Anonymity in location based services
The offering of anonymity in relational databases has attracted a great deal of attention in the database community during the last decade [4]. Among the different solution appr...
Aris Gkoulalas-Divanis, Panos Kalnis, Vassilios S....