Sciweavers

761 search results - page 142 / 153
» Security Aspects of Mobile Communications
Sort
View
ACMSE
2006
ACM
14 years 2 months ago
Using an end-to-end demonstration in an undergraduate grid computing course
In this paper, we describe a demonstration called an “End-to-End” demonstration developed for the 2005 offering of our grid computing course that was taught across the State o...
Mark A. Holliday, Barry Wilkinson, James Ruff
NSPW
2006
ACM
14 years 2 months ago
Sanitization models and their limitations
This work explores issues of computational disclosure control. We examine assumptions in the foundations of traditional problem statements and abstract models. We offer a comprehe...
Rick Crawford, Matt Bishop, Bhume Bhumiratana, Lis...
DBSEC
2006
134views Database» more  DBSEC 2006»
13 years 10 months ago
Notarized Federated Identity Management for Web Services
We propose a notarized federated identity management model that supports efficient user authentication when providers are unknown to each other. Our model introduces a notary servi...
Michael T. Goodrich, Roberto Tamassia, Danfeng Yao
MMSEC
2006
ACM
195views Multimedia» more  MMSEC 2006»
14 years 2 months ago
Image annotation watermarking: nested object embedding using hypergraph model
In this paper, we introduce to the special domain of image annotation watermarking, based on embedding of hierarchical data related to objects into user-selected areas on an image...
Claus Vielhauer, Maik Schott
XMLSEC
2003
ACM
14 years 2 months ago
An access control framework for business processes for web services
Business Processes for Web Services are the new paradigm for the lightweight integration of business from different enterprises. Whereas the security and access control policies ...
Hristo Koshutanski, Fabio Massacci