Sciweavers

15379 search results - page 65 / 3076
» Protecting users from
Sort
View
WEBI
2004
Springer
14 years 1 months ago
Self-Protection of Web Content
In most Internet applications, there is little control on how to protect the data content once it reaches the client. Implementing centralized control for data content delivered t...
Hoi Chan, Trieu C. Chieu
CSREAPSC
2006
13 years 9 months ago
Ubiquitous Security: Privacy versus Protection
- In the ambient computing future, security promises to be the foundational design feature that allows pervasive systems to protect personal information privacy. As fledgling perva...
Timothy Buennemeyer, Randolph Marchany, Joseph G. ...
ERCIMDL
2007
Springer
111views Education» more  ERCIMDL 2007»
14 years 1 months ago
Using Watermarks and Offline DRM to Protect Digital Images in DIAS
The Digital Image Archiving System (DIAS) is an image management system, the major functions of which are preserving valuable digital images and serving as an image provider for ex...
Hsin-Yu Chen, Hsiang-An Wang, Chin-Lung Lin
ACNS
2003
Springer
168views Cryptology» more  ACNS 2003»
14 years 28 days ago
PLI: A New Framework to Protect Digital Content for P2P Networks
In this paper, we first propose a novel Public License Infrastructure (PLI) that uses cryptographic threshold secret sharing schemes to provide decentralized public license service...
Guofei Gu, Bin B. Zhu, Shipeng Li, Shiyong Zhang
SOSP
1993
ACM
13 years 9 months ago
Protection Traps and Alternatives for Memory Management of an Object-Oriented Language
Many operating systems allow user programs to specify the protectionlevel (inaccessible, read-only, read-write) of pages in their virtual memory address space, and to handle any p...
Antony L. Hosking, J. Eliot B. Moss