Sciweavers

806 search results - page 60 / 162
» Privacy Policy Referencing
Sort
View
IJNSEC
2007
139views more  IJNSEC 2007»
13 years 10 months ago
Virtual Private Services: Coordinated Policy Enforcement for Distributed Applications
Large scale distributed applications combine network access with multiple storage and computational elements. The distributed responsibility for resource control creates new secur...
Sotiris Ioannidis, Steven M. Bellovin, John Ioanni...
WPES
2003
ACM
14 years 3 months ago
Policy migration for sensitive credentials in trust negotiation
Trust negotiation is an approach to establishing trust between strangers through the bilateral, iterative disclosure of digital credentials. Under automated trust negotiation, acc...
Ting Yu, Marianne Winslett
CIDR
2007
79views Algorithms» more  CIDR 2007»
13 years 11 months ago
Beyond Just Data Privacy
We argue that designing a system that “guarantees” the privacy of its information may not be enough. One must also consider the price for providing that protection: For exampl...
Bob Mungamuru, Hector Garcia-Molina
ACSAC
2010
IEEE
13 years 8 months ago
Porscha: policy oriented secure content handling in Android
The penetration of cellular networks worldwide and emergence of smart phones has led to a revolution in mobile content. Users consume diverse content when, for example, exchanging...
Machigar Ongtang, Kevin R. B. Butler, Patrick Drew...
SAINT
2007
IEEE
14 years 4 months ago
Privacy-Aware Context Discovery for Next Generation Mobile Services
We present a system that enables applications to discover and obtain information that describes the context of a particular entity (e.g., a user or a device). Our system revolves ...
Cristian Hesselman, Henk Eertink, Martin Wibbels