Sciweavers

408 search results - page 38 / 82
» Tailoring Privacy to Users' Needs
Sort
View
ACSAC
2007
IEEE
14 years 2 months ago
Extending the Java Virtual Machine to Enforce Fine-Grained Security Policies in Mobile Devices
The growth of the applications and services market for mobile devices is currently slowed down by the lack of a flexible and reliable security infrastructure. The development and...
Iulia Ion, Boris Dragovic, Bruno Crispo
ISI
2007
Springer
14 years 2 months ago
A Combinatorial Approach to Measuring Anonymity
— In this paper we define a new metric for quantifying the degree of anonymity collectively afforded to users of an anonymous communication system. We show how our metric, based...
Matthew Edman, Fikret Sivrikaya, Bülent Yener
EUROSSC
2006
Springer
13 years 11 months ago
Context-Aware Trust Domains
Context-aware service platforms need to establish and manage trust relationships for users to know if the user's privacy policies are being enforced and for service providers ...
Ricardo Neisse, Maarten Wegdam, Marten van Sindere...
ERCIMDL
2003
Springer
124views Education» more  ERCIMDL 2003»
14 years 1 months ago
A Digital GeoLibrary: Integrating Keywords and Place Names
A digital library typically includes a set of keywords (or subject terms) for each document in its collection(s). For some applications, including natural resource management, geog...
Mathew Weaver, Lois M. L. Delcambre, Leonard D. Sh...
SELMAS
2004
Springer
14 years 1 months ago
Adaptive Access Control in Coordination-Based Mobile Agent Systems
The increased pervasiveness of mobile devices like cell phones, PDAs, and laptops draws attention to the need for coordination among these networked devices. The very nature of the...
Christine Julien, Jamie Payton, Gruia-Catalin Roma...