Sciweavers

15379 search results - page 211 / 3076
» Protecting users from
Sort
View
BROADNETS
2007
IEEE
14 years 2 months ago
IP fast rerouting for single-link/node failure recovery
—Failure recovery in IP networks is critical to high quality service provisioning. The main challenge is how to achieve fast recovery without introducing high complexity and reso...
Kang Xi, H. Jonathan Chao
ESORICS
2005
Springer
14 years 1 months ago
On Obligations
Access control is concerned with granting access to sensitive data based on conditions that relate to the past or present, so-called provisions. Expressing requirements from the do...
Manuel Hilty, David A. Basin, Alexander Pretschner
ISW
2004
Springer
14 years 1 months ago
The Obfuscation Executive
Abstract. Code obfuscations are semantics-preserving code transformations used to protect a program from reverse engineering. There is generally no expectation of complete, long-te...
Kelly Heffner, Christian S. Collberg
ECOOP
1999
Springer
14 years 11 days ago
Providing Fine-grained Access Control for Java Programs
There is considerable interest in programs that can migrate from one host to another and execute. Mobile programs are appealing because they support efficient utilization of networ...
Raju Pandey, Brant Hashii
GIS
2008
ACM
13 years 9 months ago
Towards a scalable model for location privacy
With the growth of wireless and mobile technologies, we are witnessing an increase in location-based services (LBS). Although LBS provide enhanced functionalities, they open up ne...
Nayot Poolsappasit, Indrakshi Ray