Sciweavers

427 search results - page 18 / 86
» Policies: Giving Users Control over Calls
Sort
View
CORR
2012
Springer
227views Education» more  CORR 2012»
12 years 5 months ago
Trajectory and Policy Aware Sender Anonymity in Location Based Services
We consider Location-based Service (LBS) settings, where a LBS provider logs the requests sent by mobile device users over a period of time and later wants to publish/share these ...
Alin Deutsch, Richard Hull, Avinash Vyas, Kevin Ke...
CCR
1998
140views more  CCR 1998»
13 years 9 months ago
Policy tree multicast routing: an extension to sparse mode source tree delivery
Bandwidth-sensitive multicast delivery controlled by routing criteria pertinent to the actual traffic flow is very costly in terms of router state and control overhead and it scal...
Horst Hodel
EUROSYS
2008
ACM
14 years 7 months ago
Manageable fine-grained information flow
The continuing frequency and seriousness of security incidents underlines the importance of application security. Decentralized information flow control (DIFC), a promising tool ...
Petros Efstathopoulos, Eddie Kohler
ASSETS
2009
ACM
13 years 7 months ago
3DScan: an environment control system supporting persons with severe motor impairments
This proposal is about a poster dealing with a scanningbased software system, which aims at giving persons with severe motor impairments a means to interact with their immediate e...
Torsten Felzer, Stephan Rinderknecht
SACMAT
2005
ACM
14 years 3 months ago
Generalized XML security views
We investigate a generalization of the notion of XML security view introduced by Stoica and Farkas [17] and later refined by Fan et al. [8]. The model consists of access control ...
Gabriel M. Kuper, Fabio Massacci, Nataliya Rassadk...