Sciweavers

823 search results - page 20 / 165
» Location Based Access to Moving Data Sources
Sort
View
132
Voted
ACSW
2007
15 years 5 months ago
Securing Grid Data Using Mandatory Access Controls
The main contribution of this paper is to investigate issues in using Mandatory Access Controls (MACs), namely those provided by SELinux, to secure application-level data. Particu...
Matthew Henricksen, William J. Caelli, Peter R. Cr...
137
Voted
MDM
2007
Springer
136views Communications» more  MDM 2007»
15 years 9 months ago
iPDA: Supporting Privacy-Preserving Location-Based Mobile Services
This demonstration presents iPDA, a system to support privacy-preserving data access in location-based mobile services. The iPDA system consists of three main components: 1) a mob...
Jing Du, Jianliang Xu, Xueyan Tang, Haibo Hu
133
Voted
CSE
2009
IEEE
15 years 10 months ago
Analysis of a Location-Based Social Network
—Location-based Social Networks (LSNs) allow users to see where their friends are, to search location-tagged content within their social graph, and to meet others nearby. The rec...
Nan Li, Guanling Chen
126
Voted
CSIE
2009
IEEE
15 years 10 months ago
A Location-Based Mechanism for Mobile Device Security
While mobile handheld devices, such as cell phones and PDAs, provide productivity benefits, they also pose new risks. A vital safeguard against unauthorized access to a device’s...
Wayne A. Jansen, Vlad Korolev
193
Voted
PDIS
1996
IEEE
15 years 7 months ago
Capabilities-Based Query Rewriting in Mediator Systems
Users today are struggling to integrate a broad range of information sources providing di erent levels of query capabilities. Currently, data sources with di erent and limitedcapa...
Yannis Papakonstantinou, Ashish Gupta, Laura M. Ha...