Sciweavers

1040 search results - page 12 / 208
» Privacy for Telecom Services
Sort
View
CCS
2008
ACM
13 years 9 months ago
User-controllable learning of security and privacy policies
Studies have shown that users have great difficulty specifying their security and privacy policies in a variety of application domains. While machine learning techniques have succ...
Patrick Gage Kelley, Paul Hankes Drielsma, Norman ...
AICT
2007
IEEE
122views Communications» more  AICT 2007»
13 years 9 months ago
Towards Security Analyses of an Identity Federation Protocol for Web Services in Convergent Networks
— We describe a formal approach to the analysis of security aspects of an identity federation protocol for web services in convergent networks. This network protocol was proposed...
Maurice H. ter Beek, Corrado Moiso, Marinella Petr...
FORTE
2007
13 years 9 months ago
Specifying and Composing Interaction Protocols for Service-Oriented System Modelling
Abstract. We present and discuss a formal, high-level approach to the specification and composition of interaction protocols for service-oriented systems. This work is being develo...
João Abreu, Laura Bocchi, José Luiz ...
CIT
2006
Springer
13 years 11 months ago
An Event Notification Service based on XML Messaging on Different Transport Technologies
With the size and increasing complexity of telecom networks, there is a need to interconnect management systems at different levels. This requires information flow across many app...
Ravinder Thirumala, N. Usha Rani, Timothy A. Gonsa...
GIS
2008
ACM
13 years 8 months ago
Towards a scalable model for location privacy
With the growth of wireless and mobile technologies, we are witnessing an increase in location-based services (LBS). Although LBS provide enhanced functionalities, they open up ne...
Nayot Poolsappasit, Indrakshi Ray