Sciweavers

947 search results - page 86 / 190
» Information Security in Mobile Databases
Sort
View
133
Voted
ICDE
2008
IEEE
141views Database» more  ICDE 2008»
15 years 10 months ago
Provenance-aware secure networks
Network accountability and forensic analysis have become increasingly important, as a means of performing network diagnostics, identifying malicious nodes, enforcing trust managem...
Wenchao Zhou, Eric Cronin, Boon Thau Loo
153
Voted
SECURWARE
2008
IEEE
15 years 10 months ago
A Body-Centered Cubic Method for Key Agreement in Dynamic Mobile Ad Hoc Networks
Mobile ad hoc networking is an operating mode for rapid mobile host interconnection, where nodes rely on each other, in order to maintain network connectivity and functionality. S...
Ioannis G. Askoxylakis, Damien Sauveron, Constanti...
135
Voted
ICCS
2004
Springer
15 years 9 months ago
A Two-Leveled Mobile Agent System for E-commerce with Constraint-Based Filtering
This paper presents a two-leveled mobile agent system for electronic commerce. It is based on mobile agents as mediators and uses the publish/subscribe paradigm for registration an...
Ozgur Koray Sahingoz, Nadia Erdogan
124
Voted
DASFAA
2010
IEEE
148views Database» more  DASFAA 2010»
15 years 8 months ago
Competitive Privacy: Secure Analysis on Integrated Sequence Data
Sequence data analysis has been extensively studied in the literature. However, most previous work focuses on analyzing sequence data from a single source or party. In many applica...
Raymond Chi-Wing Wong, Eric Lo
187
Voted
SIGMOD
2008
ACM
119views Database» more  SIGMOD 2008»
16 years 3 months ago
Report on the Principles of Provenance Workshop
Provenance, or records of the origin, context, custody, derivation or other historical information about a (digital) object, has recently become an important research topic in a n...
James Cheney, Peter Buneman, Bertram Ludäscher