Sciweavers

1663 search results - page 89 / 333
» Privacy and Identity Management
Sort
View
ISI
2007
Springer
15 years 10 months ago
Managing Security Threats and Vulnerabilities for Small to Medium Enterprises
– The difficulty in managing security threats and vulnerabilities for small and medium-sized enterprises (SME) is investigated. A detailed conceptual framework for asset and thre...
Cyril Onwubiko, Andrew P. Lenaghan
ISI
2008
Springer
15 years 4 months ago
Summary management in unstructured P2P systems
In this paper, we propose managing data summaries in unstructured P2P systems. Our summaries are intelligible views with two main virtues. First, they can be directly queried and u...
Rabab Hayek, Guillaume Raschia, Patrick Valduriez,...
PET
2009
Springer
15 years 11 months ago
On the Optimal Placement of Mix Zones
Abstract. In mobile wireless networks, third parties can track the location of mobile nodes by monitoring the pseudonyms used for identification. A frequently proposed solution to...
Julien Freudiger, Reza Shokri, Jean-Pierre Hubaux
SOUPS
2009
ACM
15 years 11 months ago
Ubiquitous systems and the family: thoughts about the networked home
Developments in ubiquitous and pervasive computing herald a future in which computation is embedded into our daily lives. Such a vision raises important questions about how people...
Linda Little, Elizabeth Sillence, Pamela Briggs
WPES
2006
ACM
15 years 10 months ago
Revisiting the uniqueness of simple demographics in the US population
According to a famous study [10] of the 1990 census data, 87% of the US population can be uniquely identified by gender, ZIP code and full date of birth. This short paper revisit...
Philippe Golle