Sciweavers

579 search results - page 77 / 116
» Security Enforcement Model for Distributed Usage Control
Sort
View
PET
2010
Springer
14 years 26 days ago
unFriendly: Multi-party Privacy Risks in Social Networks
Abstract. As the popularity of social networks expands, the information users expose to the public has potentially dangerous implications for individual privacy. While social netwo...
Kurt Thomas, Chris Grier, David M. Nicol
ADAEUROPE
2008
Springer
14 years 3 months ago
An Ada 2005 Technology for Distributed and Real-Time Component-Based Applications
: The concept of interface in Ada 2005 significantly facilitates its usage as the basis for a software components technology. This technology, taking benefit of the resources that ...
Patricia López Martínez, José...
GPC
2009
Springer
13 years 6 months ago
I/O Device Virtualization in the Multi-core era, a QoS Perspective
In this paper, we propose an extension to the I/O device architecture, as recommended in the PCI-SIG IOV specification, for virtualizing network I/O devices. The aim is to enable ...
J. Lakshmi, S. K. Nandy
CCS
2010
ACM
13 years 8 months ago
Protecting location privacy against inference attacks
GPS-enabled mobile devices are a quickly growing market and users are starting to share their location information with each other through services such as Google Latitude. Locati...
Kazuhiro Minami, Nikita Borisov
ELPUB
1998
ACM
14 years 1 months ago
Addressing Publishing Issues with Hypermedia Distributed on the Web
The content and structure of an electronically published document can be authored and processed in ways that allow for flexibility in presentation on different environments for di...
Lloyd Rutledge, Lynda Hardman, Jacco van Ossenbrug...