Sciweavers

313 search results - page 30 / 63
» Privacy in Location-Aware Computing Environments
Sort
View
SOCA
2007
IEEE
14 years 2 months ago
Negotiating Agreements Using Policies in Ubiquitous Computing Scenarios
The emerging ubiquitous computing vision is characterized by decentralized and ad hoc interoperation among devices and networks for access to services. Interacting devices or grou...
Venkatraman Ramakrishna, Kevin Eustice, Peter L. R...
SAINT
2005
IEEE
14 years 1 months ago
A Context-centric Security Middleware for Service Provisioning in Pervasive Computing
Pervasive user mobility, wireless connectivity and the widespread diffusion of portable devices raise new challenges for ubiquitous service provisioning. An emerging architecture ...
Antonio Corradi, Rebecca Montanari, Daniela Tibald...
CSFW
2011
IEEE
12 years 7 months ago
Local Memory via Layout Randomization
—Randomization is used in computer security as a tool to introduce unpredictability into the software infrastructure. In this paper, we study the use of randomization to achieve ...
Radha Jagadeesan, Corin Pitcher, Julian Rathke, Ja...
ESORICS
2011
Springer
12 years 7 months ago
Automated Information Flow Analysis of Virtualized Infrastructures
The use of server virtualization has been growing steadily, but many enterprises still are reluctant to migrate critical workloads to such infrastructures. One key inhibitor is the...
Sören Bleikertz, Thomas Groß, Matthias ...
IEEEARES
2010
IEEE
13 years 11 months ago
Optimising IDS Sensor Placement
—In large network environments multiple intrusion detection sensors are needed to adequately monitor network traffic. However, deploying and managing additional sensors on a lar...
Hao Chen, John A. Clark, Siraj A. Shaikh, Howard C...