Sciweavers

1517 search results - page 33 / 304
» Time and Location Based Services with Access Control
Sort
View
PERCOM
2005
ACM
14 years 8 months ago
A Capability-Based Privacy-Preserving Scheme for Pervasive Computing Environments
Pervasive computing is a future technology that provides a user with the capability to compute and communicate from everywhere. In a pervasive computing environment, a user interac...
Divyan M. Konidala, Dang Nguyen Duc, Dongman Lee, ...
DBSEC
2007
87views Database» more  DBSEC 2007»
13 years 10 months ago
Towards a Times-Based Usage Control Model
Abstract. Modern information systems require temporal and privilegeconsuming usage of digital objects. To meet these requirements, we present a new access control model–Times-bas...
Baoxian Zhao, Ravi S. Sandhu, Xinwen Zhang, Xiaoli...
CCS
2007
ACM
14 years 2 months ago
How much anonymity does network latency leak?
Low-latency anonymity systems such as Tor, AN.ON, Crowds, and Anonymizer.com aim to provide anonymous connections that are both untraceable by “local” adversaries who control ...
Nicholas Hopper, Eugene Y. Vasserman, Eric Chan-Ti...
NCA
2006
IEEE
14 years 2 months ago
A Distributed Architecture for Gracefully Degradable Web-Based Services
Modern Web sites provide multiple services that are often deployed through distributed architectures. The importance and the economic impact of Web-based services introduces signi...
Mauro Andreolini, Sara Casolari, Michele Colajanni
JSAC
2010
143views more  JSAC 2010»
13 years 7 months ago
Balancing competing resource allocation demands in a public cellular network that supports emergency services
Abstract—When an emergency happens, public communication networks, including cellular networks, public switched telecommunication networks, and the Internet can be utilized to su...
Jiazhen Zhou, C. Beard