Sciweavers

1656 search results - page 287 / 332
» Secure Computation Without Authentication
Sort
View
WWW
2007
ACM
14 years 9 months ago
Reliable QoS monitoring based on client feedback
Service-level agreements (SLAs) establish a contract between service providers and clients concerning Quality of Service (QoS) parameters. Without proper penalties, service provid...
Radu Jurca, Boi Faltings, Walter Binder
CSE
2009
IEEE
14 years 3 months ago
Architectural Support for Automated Software Attack Detection, Recovery, and Prevention
—Attacks on software systems are an increasingly serious problem from an economic and security standpoint. Many techniques have been proposed ranging from simple compiler modifi...
Jesse Sathre, Alex Baumgarten, Joseph Zambreno
SIGCOMM
2009
ACM
14 years 3 months ago
PathForge: faithful anonymization of movement data
For most mobile networks, providers need the current position of their users to provide efficient service. The resulting motion data is not only an invaluable source for analyzing...
Sebastian Kay Belle, Marcel Waldvogel, Oliver Haas...
IEEESCC
2005
IEEE
14 years 2 months ago
Knowledge as a Service and Knowledge Breaching
In this paper, we introduce and explore a new computing paradigm we call knowledge as a service, in which a knowledge service provider, via its knowledge server, answers queries p...
Shouhuai Xu, Weining Zhang
SPC
2005
Springer
14 years 2 months ago
TrustAC: Trust-Based Access Control for Pervasive Devices
Alice first meets Bob in an entertainment shop, then, they wish to share multimedia content, but Do they know what are trustworthy users? How do they share such information in a s...
Florina Almenárez Mendoza, Andrés Ma...