Sciweavers

166 search results - page 17 / 34
» Protecting Applications with Transient Authentication
Sort
View
DIM
2009
ACM
14 years 1 months ago
Privacy-aware identity management for client-side mashup applications
This paper concerns the problem of identity management in modern Web-2.0-based mashup applications. Identity management supports convenient access to information when mashups are ...
Saman Zarandioon, Danfeng Yao, Vinod Ganapathy
IWIA
2005
IEEE
14 years 10 days ago
Enforcing Messaging Security Policies
A system for enforcing messaging security policies for both store and forward and streaming messaging protocols on COTS operating system platforms is described. Messaging protocol...
Jaromir Likavec, Stephen D. Wolthusen
ICPR
2008
IEEE
14 years 1 months ago
Biomapping: Privacy trustworthy biometrics using noninvertible and discriminable constructions
Biometric authentication and privacy protection are conflicting issues in a practical system. Since biometrics cannot be revoked or canceled if compromised duo to the permanent as...
Jinyang Shi, Zhiyang You, Ming Gu, Kwok-Yan Lam
IH
2007
Springer
14 years 27 days ago
Three-Dimensional Meshes Watermarking: Review and Attack-Centric Investigation
The recent decade has seen the emergence of 3D meshes in industrial, medical and entertainment applications. Therefore, their intellectual property protection problem has attracted...
Kai Wang, Guillaume Lavoué, Florence Denis,...
SACMAT
2010
ACM
13 years 11 months ago
An access control model for mobile physical objects
Access to distributed databases containing tuples collected about mobile physical objects requires information about the objects’ trajectories. Existing access control models ca...
Florian Kerschbaum