Sciweavers

947 search results - page 130 / 190
» Information Security in Mobile Databases
Sort
View
DSOM
2003
Springer
14 years 4 months ago
Management Challenges of Context-Aware Services in Ubiquitous Environments
Ubiquitous environments facilitate the collection of information pieces from sensors, databases, or mobile devices in order to compose the context of entities like users, places, o...
Heinz-Gerd Hegering, Axel Küpper, Claudia Lin...
WWW
2007
ACM
14 years 11 months ago
Delay tolerant applications for low bandwidth and intermittently connected users: the aAQUA experience
With the explosive growth and spread of Internet, web access from mobile and rural users has become significant. But these users face problems of low bandwidth and intermittent In...
Saurabh Sahni, Krithi Ramamritham
DBSEC
2008
188views Database» more  DBSEC 2008»
14 years 14 days ago
On the Formal Analysis of a Spatio-temporal Role-Based Access Control Model
With the growing use of wireless networks and mobile devices, we are moving towards an era where spatial and temporal information will be necessary for access control. The use of s...
Manachai Toahchoodee, Indrakshi Ray
SIGCOMM
2009
ACM
14 years 5 months ago
PathForge: faithful anonymization of movement data
For most mobile networks, providers need the current position of their users to provide efficient service. The resulting motion data is not only an invaluable source for analyzing...
Sebastian Kay Belle, Marcel Waldvogel, Oliver Haas...
WMCSA
2008
IEEE
14 years 5 months ago
Distributed authentication for low-cost wireless networks
Cost is one of the key challenges facing the deployment of wireless networks. Though 802.11-based networks have shown that costly, licensed spectrum is not always necessary, the c...
Sridhar Machiraju, Hao Chen, Jean Bolot