Sciweavers

947 search results - page 30 / 190
» Information Security in Mobile Databases
Sort
View
144
Voted
INFOSCALE
2007
ACM
15 years 5 months ago
A flexible mandatory access control policy for XML databases
A flexible mandatory access control policy (MAC) for XML databases is presented in this paper. The label type and label access policy can be defined according to the requirements ...
Hong Zhu, Renchao Jin, Kevin Lü
129
Voted
INFOCOM
2005
IEEE
15 years 9 months ago
A quantitative study of authentication and QoS in wireless IP networks
— With the increasing demand for secure and high-quality communications in public access wireless IP networks, it is very important to have an in-depth understanding of the relat...
Wei Liang, Wenye Wang
150
Voted
SAC
1999
ACM
15 years 7 months ago
Transaction Processing in PRO-MOTION
To provide data consistency in the presence of failures and concurrency, database methods will continue to be important to the processing of shared information in a mobile computi...
Gary D. Walborn, Panos K. Chrysanthis
138
Voted
SASN
2003
ACM
15 years 8 months ago
SECTOR: secure tracking of node encounters in multi-hop wireless networks
In this paper we present SECTOR, a set of mechanisms for the secure verification of the time of encounters between nodes in multi-hop wireless networks. This information can be u...
Srdjan Capkun, Levente Buttyán, Jean-Pierre...
134
Voted
SOUPS
2009
ACM
15 years 10 months ago
Usability and security of out-of-band channels in secure device pairing protocols
Initiating and bootstrapping secure, yet low-cost, ad-hoc transactions is an important challenge that needs to be overcome if the promise of mobile and pervasive computing is to b...
Ronald Kainda, Ivan Flechais, A. W. Roscoe