Sciweavers

1663 search results - page 143 / 333
» Privacy and Identity Management
Sort
View
ACSAC
2001
IEEE
15 years 8 months ago
Determining Privileges of Mobile Agents
This paper describes a method for controlling the behavior of mobile agent-system entities through the allocation of privileges. Privileges refer to policy rules that govern the a...
Wayne A. Jansen
HT
2004
ACM
15 years 10 months ago
Managing conflict in multi-model adaptive hypertext
Adaptive hypermedia has the goal of contextualizing the display of a hypertext to suit the user and their situation. A variety of aspects of the context can influence the appropri...
Luis Francisco-Revilla, Frank M. Shipman III
CHES
2005
Springer
85views Cryptology» more  CHES 2005»
15 years 10 months ago
Secure Data Management in Trusted Computing
Abstract. In this paper we identify shortcomings of the TCG specification related to the availability of sealed data during software and hardware life cycles, i.e., software updat...
Ulrich Kühn, Klaus Kursawe, Stefan Lucks, Ahm...
ICDE
2002
IEEE
141views Database» more  ICDE 2002»
16 years 6 months ago
Providing Database as a Service
In this paper, we explore a new paradigm for data management in which a third party service provider hosts "database as a service" providing its customers seamless mecha...
Balakrishna R. Iyer, Hakan Hacigümüs, Sh...
VLDB
2005
ACM
159views Database» more  VLDB 2005»
15 years 10 months ago
Temporal Management of RFID Data
RFID technology can be used to significantly improve the efficiency of business processes by providing the capability of automatic identification and data capture. This technol...
Fusheng Wang, Peiya Liu