Sciweavers

631 search results - page 97 / 127
» Distributed Cross-Domain Change Management
Sort
View
MOBISYS
2009
ACM
14 years 8 months ago
Attacks on public WLAN-based positioning systems
In this work, we study the security of public WLAN-based positioning systems. Specifically, we investigate the Skyhook positioning system, available on PCs and used on a number of...
Nils Ole Tippenhauer, Kasper Bonne Rasmussen, Chri...
APSCC
2009
IEEE
14 years 2 months ago
MORSE: A Model-Aware Service Environment
—In a number of scenarios, services generated using a model-driven development (MDD) approach could benefit from “reflective” access to the information in the models from w...
Ta'id Holmes, Uwe Zdun, Schahram Dustdar
MEDES
2009
ACM
14 years 2 months ago
Geographic data integration to support web GIS development
Although research in data integration has become one of the main issues in [6], geographic data integration is still a laborious and complicated problem, even for specialists. Geo...
André Rocha Coimbra
CCS
2007
ACM
14 years 1 months ago
A data outsourcing architecture combining cryptography and access control
Data outsourcing is becoming today a successful solution that allows users and organizations to exploit external servers for the distribution of resources. Some of the most challe...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...
IEEEARES
2006
IEEE
14 years 1 months ago
Secure Enhanced Wireless Transfer Protocol
When IEEE 802.11i draft[1] proposed TKIP, it is expected to improve WEP on both active and passive attack methods. TKIP uses more sophisticated methods to distribute and manage se...
Jin-Cherng Lin, Yu-Hsin Kao, Chen-Wei Yang