Sciweavers

3299 search results - page 619 / 660
» Privacy and Trusted Computing
Sort
View
PERVASIVE
2006
Springer
13 years 8 months ago
"Need to Know": Examining Information Need in Location Discourse
Location discourse involves the active or passive sharing of location information between individuals. Related applications include mobile friend locators, and location-dependent m...
Derek F. Reilly, David Dearman, Vicki Ha, Ian Smit...
GRID
2008
Springer
13 years 8 months ago
A Secure Grid Medical Data Manager Interfaced to the gLite Middleware
The medical community is producing and manipulating a tremendous volume of digital data for which computerized archiving, processing and analysis is needed. Grid infrastructures ar...
Johan Montagnat, Ákos Frohner, Daniel Jouve...
PERVASIVE
2007
Springer
13 years 8 months ago
Mobiscopes for Human Spaces
The proliferation of affordable mobile devices with processing and sensing capabilities, together with the rapid growth in ubiquitous network connectivity, herald an era of Mobisc...
Tarek F. Abdelzaher, Yaw Anokwa, Péter Boda...
WOTE
2010
13 years 7 months ago
On Some Incompatible Properties of Voting Schemes
Abstract. In this paper, we study the problem of simultaneously achieving several security properties, for voting schemes, without non-standard assumptions. More specifically, we ...
Benoît Chevallier-Mames, Pierre-Alain Fouque...
APSCC
2010
IEEE
13 years 6 months ago
On Evaluating and Publishing Data Concerns for Data as a Service
Abstract--The proliferation of Data as a Service (DaaS) available on the Internet and offered by cloud service providers indicates an increasing trend in providing data under Web s...
Hong Linh Truong, Schahram Dustdar