Sciweavers

308 search results - page 57 / 62
» Identity as a Service - Towards a Service-Oriented Identity ...
Sort
View
JHSN
2006
267views more  JHSN 2006»
13 years 7 months ago
Client-side access control enforcement using trusted computing and PEI models
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard ...
Ravi S. Sandhu, Xinwen Zhang, Kumar Ranganathan, M...
WWW
2010
ACM
14 years 2 months ago
Alhambra: a system for creating, enforcing, and testing browser security policies
Alhambra is a browser-based system designed to enforce and test web browser security policies. At the core of Alhambra is a policyenhanced browser supporting fine-grain security ...
Shuo Tang, Chris Grier, Onur Aciiçmez, Samu...
ISW
2004
Springer
14 years 25 days ago
Re-thinking Security in IP Based Micro-Mobility
Security problems in micro-mobility are mostly related to trust establishment between mobile nodes and middle-boxes, i.e. mobile anchor points. In this paper, we present a secure m...
Jukka Ylitalo, Jan Melén, Pekka Nikander, V...
JDCTA
2010
150views more  JDCTA 2010»
13 years 2 months ago
A Knowledge Recommend System Based on User Model
The content and searching method of knowledge base are lack of the consideration of user requirements, it is difficult for the user to select the knowledge satisfy with the user r...
Jiagen Sheng, Sifeng Liu
INFOCOM
2006
IEEE
14 years 1 months ago
Stimulating Participation in Wireless Community Networks
—Wireless Community Networks (WCNs) are wide-area wireless networks whose nodes are owned and managed by volunteers. We focus on the provision of Internet access to mobile users ...
Elias C. Efstathiou, Pantelis A. Frangoudis, Georg...