Sciweavers

661 search results - page 66 / 133
» Distributed and Secure Access Control in P2P Databases
Sort
View
COMPSAC
2001
IEEE
14 years 19 days ago
Utilizing Object-Oriented Databases for Concurrency Control in Virtual Environments
Virtual Reality Modeling Language (VRML) is widely used to represent, create, and display virtual reality objects and their environment. Some VRML applications require concurrent ...
Damla Turgut, Nevin Aydin, Ramez Elmasri, Begumhan...
CCS
2010
ACM
13 years 8 months ago
Protecting location privacy against inference attacks
GPS-enabled mobile devices are a quickly growing market and users are starting to share their location information with each other through services such as Google Latitude. Locati...
Kazuhiro Minami, Nikita Borisov
IJNSEC
2007
139views more  IJNSEC 2007»
13 years 9 months ago
Virtual Private Services: Coordinated Policy Enforcement for Distributed Applications
Large scale distributed applications combine network access with multiple storage and computational elements. The distributed responsibility for resource control creates new secur...
Sotiris Ioannidis, Steven M. Bellovin, John Ioanni...
CCS
2008
ACM
13 years 11 months ago
Stale-safe security properties for group-based secure information sharing
Attribute staleness arises due to the physical distribution of authorization information, decision and enforcement points. This is a fundamental problem in virtually any secure di...
Ram Krishnan, Jianwei Niu, Ravi S. Sandhu, William...
WETICE
2006
IEEE
14 years 3 months ago
Autonomous Information Unit: Why Making Data Smart Can Also Make Data Secured?
In this paper, we introduce a new fine-grain distributed information protection mechanism which can self-protect, self-discover, self-organize, and selfmanage. In our approach, we...
Edward T. Chow