Sciweavers

112 search results - page 8 / 23
» Geolocation privacy and application platforms
Sort
View
TMC
2008
159views more  TMC 2008»
13 years 5 months ago
Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms
Continued advances in mobile networks and positioning technologies have created a strong market push for location-based applications. Examples include location-aware emergency resp...
Bugra Gedik, Ling Liu
ACSAC
2005
IEEE
14 years 1 months ago
Java for Mobile Devices: A Security Study
Java 2 Micro-Edition Connected Limited Device Configuration (J2ME CLDC) is the platform of choice when it comes to running mobile applications on resourceconstrained devices (cel...
Mourad Debbabi, Mohamed Saleh, Chamseddine Talhi, ...
AGENTS
2000
Springer
13 years 11 months ago
Open Source, Standards and Scaleable Agencies
Numerous agencies and agent systems are being developed or portrayed as vehicles to deliver novel types of e-commerce services to users. However service agents in one agency are p...
Stefan Poslad, Phil Buckle, Rob Hadingham
ACSAC
2001
IEEE
13 years 11 months ago
Security Policy Enforcement at the File System Level in the Windows NT Operating System Family
This paper describes the implementation of an enforcement module for file system security implemented as part of a security architecture for distributed systems which enforces a c...
Stephen D. Wolthusen
ACSAC
2009
IEEE
14 years 2 months ago
Semantically Rich Application-Centric Security in Android
—Smartphones are now ubiquitous. However, the security requirements of these relatively new systems and the applications they support are still being understood. As a result, the...
Machigar Ongtang, Stephen E. McLaughlin, William E...