Sciweavers

650 search results - page 19 / 130
» Privacy in Non-private Environments
Sort
View
ISI
2006
Springer
13 years 9 months ago
The Hats Simulator and Colab: An Integrated Information Fusion Challenge Problem and Collaborative Analysis Environment
We present an overview of our work in information fusion for intelligence analysis. This work includes the Hats Simulator and the COLAB system. The Hats Simulator is a parameterize...
Clayton T. Morrison, Paul R. Cohen
IEEEIAS
2009
IEEE
14 years 4 months ago
Privacy Protection for Speech Information
—Ubiquitous network society will be achieved soon. In the society, all electronic equipments including “sensors” are connected to the network and communicate each other to sh...
Kazumasa Yamamoto, Seiichi Nakagawa
IEEEIAS
2008
IEEE
14 years 4 months ago
Geolocation-Based Trust for Vanet's Privacy
: Research in Vehicular Ad Hoc NETworks (VANETs) has evolved considerably over the last years. Security and privacy in VANETs have recently appealed special interest in the researc...
Jetzabel Serna, Jesus Luna, Manel Medina
PERCOM
2006
ACM
14 years 9 months ago
The Master Key: A Private Authentication Approach for Pervasive Computing Environments
We propose a novel entity authentication approach for pervasive computing environments. A person uses a single device, the Master Key, which aggregates all his digital forms of ac...
Feng Zhu, Matt W. Mutka, Lionel M. Ni
WISA
2004
Springer
14 years 3 months ago
Inconsistency Detection of Authorization Policies in Distributed Component Environment
In distributed component environment, a Role-Based Access Control (RBAC) server manages all authorization policies of components in the same domains whereas the components are dist...
Chang-Joo Moon, Hoh Peter In