Sciweavers

2172 search results - page 193 / 435
» Distributed User Access Control in Sensor Networks
Sort
View
IPPS
2006
IEEE
14 years 3 months ago
Preserving source location privacy in monitoring-based wireless sensor networks
While a wireless sensor network is deployed to monitor certain events and pinpoint their locations, the location information is intended only for legitimate users. However, an eav...
Yong Xi, Loren Schwiebert, Weisong Shi
DSOM
2004
Springer
14 years 2 months ago
HiFi+: A Monitoring Virtual Machine for Autonomic Distributed Management
Autonomic distributed management enables for deploying self-directed monitoring and control tasks that track dynamic network problems such as performance degradation and security t...
Ehab S. Al-Shaer, Bin Zhang
ACSAC
2008
IEEE
14 years 3 months ago
Please Permit Me: Stateless Delegated Authorization in Mashups
Mashups have emerged as a Web 2.0 phenomenon, connecting disjoint applications together to provide unified services. However, scalable access control for mashups is difficult. T...
Ragib Hasan, Marianne Winslett, Richard M. Conlan,...
ICDE
2007
IEEE
149views Database» more  ICDE 2007»
14 years 1 months ago
Private Relationships in Social Networks
Current social networks implement very simple protection mechanisms, according to which a user can state whether his/her personal data, relationships, and resources should be eith...
Barbara Carminati, Elena Ferrari, Andrea Perego
PDP
2009
IEEE
14 years 4 months ago
BitTorrent Worm Sensor Network : P2P Worms Detection and Containment
- Peer-to-peer (p2p) networking technology has gained popularity as an efficient mechanism for users to obtain free services without the need for centralized servers. Protecting th...
Sinan Hatahet, Yacine Challal, Abdelmadjid Bouabda...