Sciweavers

836 search results - page 125 / 168
» Privacy and Trust in Distributed Networks
Sort
View
ESORICS
2009
Springer
14 years 9 months ago
Cumulative Attestation Kernels for Embedded Systems
1 There are increasing deployments of networked embedded systems and rising threats of malware intrusions on such systems. To mitigate this threat, it is desirable to enable common...
Michael LeMay, Carl A. Gunter
ACSAC
2007
IEEE
14 years 3 months ago
SSARES: Secure Searchable Automated Remote Email Storage
The increasing centralization of networked services places user data at considerable risk. For example, many users store email on remote servers rather than on their local disk. D...
Adam J. Aviv, Michael E. Locasto, Shaya Potter, An...
WISTP
2007
Springer
14 years 3 months ago
Mobile Phones as Secure Gateways for Message-Based Ubiquitous Communication
Abstract. For ubiquitous communication self-organising adhoc networks become more and more important. We consider mobile phones as appropriate secure gateways to provide access to ...
Walter Bamberger, Oliver Welter, Stephan Spitz
GROUP
2005
ACM
14 years 2 months ago
Real-world oriented information sharing using social networks
While users disseminate various information in the open and widely distributed environment of the Semantic Web, determination of who shares access to particular information is at ...
Junichiro Mori, Tatsuhiko Sugiyama, Yutaka Matsuo
SDM
2009
SIAM
113views Data Mining» more  SDM 2009»
14 years 6 months ago
Graph Generation with Prescribed Feature Constraints.
In this paper, we study the problem of how to generate synthetic graphs matching various properties of a real social network with two applications, privacy preserving social netwo...
Xiaowei Ying, Xintao Wu