Sciweavers

391 search results - page 66 / 79
» Protecting Users' Anonymity in Pervasive Computing Environme...
Sort
View
SAC
2006
ACM
14 years 2 months ago
Noxes: a client-side solution for mitigating cross-site scripting attacks
Web applications are becoming the dominant way to provide access to on-line services. At the same time, web application vulnerabilities are being discovered and disclosed at an al...
Engin Kirda, Christopher Krügel, Giovanni Vig...
PERCOM
2009
ACM
14 years 3 months ago
HIPS: A Calibration-less Hybrid Indoor Positioning System Using Heterogeneous Sensors
—Positioning is a crucial task in pervasive computing, aimed at estimating the user’s positions to provide location-based services. In this paper, we study an interesting probl...
Vincent Wenchen Zheng, Junhui Zhao, Yongcai Wang, ...
PERCOM
2007
ACM
14 years 8 months ago
Securing distributed data storage and retrieval in sensor networks
Sensor networks have been an attractive platform for pervasive computing and communication. Due to the lack of physical protection, however, sensor networks are vulnerable to atta...
Nalin Subramanian, Chanjun Yang, Wensheng Zhang
SACMAT
2010
ACM
14 years 1 months ago
Role updating for assignments
The role-based access control (RBAC) has significantly simplified the management of users and permissions in computing systems. In dynamic environments, systems are usually unde...
Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu
CCS
2009
ACM
14 years 3 months ago
Physically restricted authentication with trusted hardware
Modern computer systems permit users to access protected information from remote locations. In certain secure environments, it would be desirable to restrict this access to a part...
Michael S. Kirkpatrick, Elisa Bertino