Sciweavers

1040 search results - page 80 / 208
» Privacy for Telecom Services
Sort
View
NDSS
2009
IEEE
14 years 3 months ago
The Blind Stone Tablet: Outsourcing Durability to Untrusted Parties
We introduce a new paradigm for outsourcing the durability property of a multi-client transactional database to an untrusted service provider. Specifically, we enable untrusted s...
Peter Williams, Radu Sion, Dennis Shasha
CCS
2000
ACM
14 years 1 months ago
Using router stamping to identify the source of IP packets
Denial of Service and Distributed Denial of Service attacks have cost millions of dollars to online companies. Unfortunately, these attacks are particularly di cult to stop since ...
Thomas W. Doeppner, Philip N. Klein, Andrew Koyfma...
IJLIT
2010
67views more  IJLIT 2010»
13 years 7 months ago
Interoperability-Centric Problems: New Challenges and Legal Solutions
Whereas abandonment of detailed regulation is widely asserted to be the true way along with the fluctuations of the business models and emergence of IP-based services, there are s...
Turgut Ayhan Beydogan
SSD
2009
Springer
193views Database» more  SSD 2009»
14 years 3 months ago
Query Integrity Assurance of Location-Based Services Accessing Outsourced Spatial Databases
Outsourcing data to third party data providers is becoming a common practice for data owners to avoid the cost of managing and maintaining databases. Meanwhile, due to the populari...
Wei-Shinn Ku, Ling Hu, Cyrus Shahabi, Haixun Wang
TIME
2009
IEEE
14 years 3 months ago
Preserving Anonymity of Recurrent Location-Based Queries
—The anonymization of location based queries through the generalization of spatio-temporal information has been proposed as a privacy preserving technique. We show that the prese...
Daniele Riboni, Linda Pareschi, Claudio Bettini, S...