Sciweavers

1040 search results - page 93 / 208
» Privacy for Telecom Services
Sort
View
ACSAC
2002
IEEE
14 years 2 months ago
A Context-Aware Security Architecture for Emerging Applications
We describe an approach to building security services for context-aware environments. Specifically, we focus on the design of security services that incorporate the use of securi...
Michael J. Covington, Prahlad Fogla, Zhiyuan Zhan,...
ACSAC
2004
IEEE
14 years 27 days ago
Securing Java RMI-Based Distributed Applications
Both Java RMI and Jini use a proxy-based architecture. In this architecture, a client interacts with a service through a proxy, which is code downloaded from a directory and insta...
Ninghui Li, John C. Mitchell, Derrick Tong
MDM
2007
Springer
125views Communications» more  MDM 2007»
14 years 3 months ago
Extending P3P/Appel for Friend Finder
FriendFinder as a location-based service collects location data from mobile users and distributes a particular user’s location upon request. Privacy of users data especially loc...
Emin Islam Tatli
PADL
2012
Springer
12 years 4 months ago
Recent Advances in Declarative Networking
Declarative networking is a programming methodology that enables developers to concisely specify network protocols and services, and directly compile these specifications into a d...
Boon Thau Loo, Harjot Gill, Changbin Liu, Yun Mao,...
CRYPTO
1990
Springer
78views Cryptology» more  CRYPTO 1990»
14 years 1 months ago
How to Time-Stamp a Digital Document
The prospect of a world in which all text, audio, picture, and video documents are in digital form on easily modi able media raises the issue of how to certify when a document was...
Stuart Haber, W. Scott Stornetta