Sciweavers

402 search results - page 61 / 81
» Hiding Location Information from Location-Based Services
Sort
View
WISEC
2010
ACM
13 years 8 months ago
Mobile user location-specific encryption (MULE): using your office as your password
Data breaches due to stolen laptops are a major problem. Solutions exist to secure sensitive files on laptops, but are rarely deployed because users view them as inconvenient. Thi...
Ahren Studer, Adrian Perrig
SIGCOMM
2012
ACM
11 years 10 months ago
Network-aware service placement in a distributed cloud environment
We consider a system of compute and storage resources geographically distributed over a large number of locations connected via a wide-area network. By distributing the resources,...
Moritz Steiner, Bob Gaglianello Gaglianello, Vijay...
SIGSOFT
2001
ACM
14 years 8 months ago
WREN---an environment for component-based development
Prior research in software environments focused on three important problems-- tool integration, artifact management, and process guidance. The context for that research, and hence...
Chris Lüer, David S. Rosenblum
CCS
2011
ACM
12 years 7 months ago
Cirripede: circumvention infrastructure using router redirection with plausible deniability
Many users face surveillance of their Internet communications and a significant fraction suffer from outright blocking of certain destinations. Anonymous communication systems a...
Amir Houmansadr, Giang T. K. Nguyen, Matthew Caesa...
JCIT
2008
100views more  JCIT 2008»
13 years 7 months ago
Basic Portal System with the Function of Communication Control for Each User
The Personal Portal is generally used as a communication mean and serves as an entrance to users where they can acquire interested information on the network. We have several prob...
Kazuya Odagiri, Rihito Yaegashi, Masaharu Tadauchi...