Sciweavers

947 search results - page 46 / 190
» Information Security in Mobile Databases
Sort
View
148
Voted
CSREASAM
2006
15 years 5 months ago
Data Security and wireless networks: mutually exclusive?
- The increased use and popularity of wireless networks has seen their adoption in medical information systems. They provide the advantages of mobility and instant information avai...
Andrew Woodward
149
Voted
WISEC
2010
ACM
15 years 3 months ago
Mobile user location-specific encryption (MULE): using your office as your password
Data breaches due to stolen laptops are a major problem. Solutions exist to secure sensitive files on laptops, but are rarely deployed because users view them as inconvenient. Thi...
Ahren Studer, Adrian Perrig
99
Voted
ICDE
2008
IEEE
131views Database» more  ICDE 2008»
15 years 10 months ago
PLUS: Synthesizing privacy, lineage, uncertainty and security
— Privacy, lineage, uncertainty, and security are important to many information integration efforts, and these “PLUS” properties interact in a number of complex ways. This pa...
Barbara T. Blaustein, Len Seligman, Michael Morse,...
136
Voted
ACSAC
2004
IEEE
15 years 7 months ago
PEACE: A Policy-Based Establishment of Ad-hoc Communities
Ad-hoc networks are perceived as communities of autonomous devices that interconnect with each other. Typically, they have dynamic topologies and cannot rely on a continuous conne...
Sye Loong Keoh, Emil Lupu, Morris Sloman
183
Voted
SIGMOD
2012
ACM
250views Database» more  SIGMOD 2012»
13 years 6 months ago
Authenticating location-based services without compromising location privacy
The popularity of mobile social networking services (mSNSs) is propelling more and more businesses, especially those in retailing and marketing, into mobile and location-based for...
Haibo Hu, Jianliang Xu, Qian Chen, Ziwei Yang