Sciweavers

808 search results - page 65 / 162
» Distributed Anonymization: Achieving Privacy for Both Data S...
Sort
View
WISTP
2010
Springer
14 years 2 months ago
Secure and Usable Out-Of-Band Channels for Ad Hoc Mobile Device Interactions
Protocols for bootstrapping security in ad hoc mobile device interactions rely on users’ ability to perform specific tasks such as transferring or comparing fingerprints of inf...
Ronald Kainda, Ivan Flechais, A. W. Roscoe
SAC
2010
ACM
13 years 8 months ago
TransPeer: adaptive distributed transaction monitoring for Web2.0 applications
In emerging Web2.0 applications such as virtual worlds or social networking websites, the number of users is very important (tens of thousands), hence the amount of data to manage...
Idrissa Sarr, Hubert Naacke, Stéphane Gan&c...
CCS
2009
ACM
14 years 2 months ago
A probabilistic approach to hybrid role mining
Role mining algorithms address an important access control problem: configuring a role-based access control system. Given a direct assignment of users to permissions, role mining...
Mario Frank, Andreas P. Streich, David A. Basin, J...
KDD
2010
ACM
215views Data Mining» more  KDD 2010»
13 years 11 months ago
On the quality of inferring interests from social neighbors
This paper intends to provide some insights of a scientific problem: how likely one’s interests can be inferred from his/her social connections – friends, friends’ friends,...
Zhen Wen, Ching-Yung Lin
HPDC
2007
IEEE
13 years 11 months ago
MOB: zero-configuration high-throughput multicasting for grid applications
Grid applications often need to distribute large amounts of data efficiently from one cluster to multiple others (multicast). Existing methods usually arrange nodes in optimized t...
Mathijs den Burger, Thilo Kielmann