Sciweavers

830 search results - page 148 / 166
» Owned Policies for Information Security
Sort
View
JCP
2007
121views more  JCP 2007»
13 years 7 months ago
p-Trust: A New Model of Trust to Allow Finer Control Over Privacy in Peer-to-Peer Framework
— Every time a user conducts an electronic transaction over the Internet a wealth of personal information is revealed, either voluntarily or involuntarily. This causes serious br...
Sudip Chakraborty, Indrajit Ray
CNSR
2007
IEEE
124views Communications» more  CNSR 2007»
14 years 1 months ago
Evaluation Framework of Location Privacy of Wireless Mobile Systems with Arbitrary Beam Pattern
Position localization of transmitters can be carried out by an adversary owning a network of pervasive receivers, which can pinpoint the victim mobile nodes’ locations with high...
Ford-Long Wong, Min Lin, Shishir Nagaraja, Ian J. ...
HUC
2009
Springer
14 years 14 hour ago
Privately querying location-based services with SybilQuery
To usefully query a location-based service, a mobile device must typically present its own location in its query to the server. This may not be acceptable to clients that wish to ...
Pravin Shankar, Vinod Ganapathy, Liviu Iftode
CN
2010
164views more  CN 2010»
13 years 7 months ago
Attribute-based on-demand multicast group setup with membership anonymity
In many applications, it is desired to dynamically establish temporary multicast groups for secure message delivery. It is also often the case that the group membership informatio...
Shucheng Yu, Kui Ren, Wenjing Lou
SC
2009
ACM
14 years 2 months ago
Using dynamic accounts to enable access to advanced resources through science gateways
Science Gateways have emerged as a valuable solution for providing large numbers of users with access to advanced computing resources. Additionally, they can hide many of the comp...
Joseph A. Insley, Ti Leggett, Michael E. Papka