Sciweavers

789 search results - page 54 / 158
» Mobile Voice Access in Social Networking Systems
Sort
View
ICDCSW
2003
IEEE
14 years 1 months ago
Privilege Delegation and Agent-Oriented Access Control in Naplet
Access control in existing Java-based mobile agents is mostly based on code source due to limitations of early Java security architecture. That is, authorization is based on where...
Cheng-Zhong Xu, Song Fu
PODC
2011
ACM
12 years 11 months ago
Securing social networks
We present a cryptographic framework to achieve access control, privacy of social relations, secrecy of resources, and anonymity of users in social networks. The main idea is to u...
Michael Backes, Matteo Maffei, Kim Pecina
SOUPS
2009
ACM
14 years 3 months ago
Social applications: exploring a more secure framework
Online social network sites, such as MySpace, Facebook and others have grown rapidly, with hundreds of millions of active users. A new feature on many sites is social applications...
Andrew Besmer, Heather Richter Lipford, Mohamed Sh...
TRIDENTCOM
2005
IEEE
14 years 2 months ago
Analysis and Experimentation over Heterogeneous Wireless Networks
Wireless and mobile networks represent an enabling technology for ubiquitous access to information systems. However, there are critical issues that still prevent the widespread us...
Massimo Bernaschi, Antonio Pescapè, Filippo...
MATA
2004
Springer
103views Communications» more  MATA 2004»
14 years 1 months ago
Mobility Prediction for Mobile Agent-Based Service Continuity in the Wireless Internet
New challenging deployment scenarios are integrating mobile devices with limited and heterogeneous capabilities that roam among wireless access localities during service provisioni...
Paolo Bellavista, Antonio Corradi, Carlo Giannelli