Sciweavers

1040 search results - page 120 / 208
» Privacy for Telecom Services
Sort
View
SP
2002
IEEE
147views Security Privacy» more  SP 2002»
13 years 7 months ago
CX: A scalable, robust network for parallel computing
CX, a network-based computational exchange, is presented. The system's design integrates variations of ideas from other researchers, such as work stealing, non-blocking tasks...
Peter R. Cappello, Dimitros Mourloukos
ICWS
2009
IEEE
13 years 5 months ago
Identity Attribute-Based Role Provisioning for Human WS-BPEL Processes
The WS-BPEL specification focuses on business processes the activities of which are assumed to be interactions with Web services. However, WS-BPEL processes go beyond the orchestr...
Federica Paci, Rodolfo Ferrini, Elisa Bertino
CHI
2011
ACM
12 years 11 months ago
I'm the mayor of my house: examining why people use foursquare - a social-driven location sharing application
There have been many location sharing systems developed over the past two decades, and only recently have they started to be adopted by consumers. In this paper, we present the re...
Janne Lindqvist, Justin Cranshaw, Jason Wiese, Jas...
CCS
2011
ACM
12 years 7 months ago
How to break XML encryption
XML Encryption was standardized by W3C in 2002, and is implemented in XML frameworks of major commercial and open-source organizations like Apache, redhat, IBM, and Microsoft. It ...
Tibor Jager, Somorovsky Juraj
VLDB
2007
ACM
187views Database» more  VLDB 2007»
14 years 8 months ago
Secure Data Outsourcing
The networked and increasingly ubiquitous nature of today's data management services mandates assurances to detect and deter malicious or faulty behavior. This is particularly...
Radu Sion