Sciweavers

2024 search results - page 33 / 405
» Providing Secure Environments for Untrusted Network Applicat...
Sort
View
152
Voted
ISN
1999
Springer
139views Communications» more  ISN 1999»
15 years 8 months ago
Simplifying Real-Time Multimedia Application Development Using Session Descriptions
This paper presents a novel approach that simplifies real-time multimedia communication applications development and service provision. Such applications are no longer required to...
Sarom Ing, Steve Rudkin
ICPPW
2006
IEEE
15 years 10 months ago
m-LPN: An Approach Towards a Dependable Trust Model for Pervasive Computing Applications
Trust, the fundamental basis of ‘cooperation’ – one of the most important characteristics for the performance of pervasive ad hoc network-- is under serious threat with the ...
Munirul M. Haque, Sheikh Iqbal Ahamed
ACNS
2009
Springer
142views Cryptology» more  ACNS 2009»
15 years 11 months ago
Integrity Protection for Revision Control
Abstract. Users of online-collaboration tools and network storage services place considerable trust in their providers. This paper presents a novel approach for protecting data int...
Christian Cachin, Martin Geisler
SACMAT
2010
ACM
15 years 2 months ago
An architecture for enforcing end-to-end access control over web applications
The web is now being used as a general platform for hosting distributed applications like wikis, bulletin board messaging systems and collaborative editing environments. Data from...
Boniface Hicks, Sandra Rueda, Dave King 0002, Thom...
132
Voted
ACSAC
2001
IEEE
15 years 8 months ago
Privacy-Preserving Cooperative Statistical Analysis
The growth of the Internet opens up tremendous opportunities for cooperative computation, where the answer depends on the private inputs of separate entities. Sometimes these comp...
Wenliang Du, Mikhail J. Atallah