Sciweavers

9231 search results - page 1610 / 1847
» informs 2008
Sort
View
ESORICS
2008
Springer
15 years 6 months ago
Security Provisioning in Pervasive Environments Using Multi-objective Optimization
Pervasive computing applications involve information flow across multiple organizations. Thus, any security breach in an application can have far-reaching consequences. However, ef...
Rinku Dewri, Indrakshi Ray, Indrajit Ray, Darrell ...
ESORICS
2008
Springer
15 years 6 months ago
A Framework for the Analysis of Mix-Based Steganographic File Systems
Abstract. The goal of Steganographic File Systems (SFSs) is to protect users from coercion attacks by providing plausible deniability on the existence of hidden files. We consider ...
Claudia Díaz, Carmela Troncoso, Bart Prenee...
ESORICS
2008
Springer
15 years 6 months ago
Modeling Privacy Insurance Contracts and Their Utilization in Risk Management for ICT Firms
The rapid expansion of Internet based services has created opportunities for ICT firms to collect and use, in an unauthorized way, information about individuals (e.g. customers, pa...
Athanassios N. Yannacopoulos, Costas Lambrinoudaki...
ESORICS
2008
Springer
15 years 6 months ago
A Multi-Path Approach for k-Anonymity in Mobile Hybrid Networks
The ubiquitous proliferation of mobile devices has given rise to novel user-centric application and services. In current mobile systems, users gain access to remote service provide...
Claudio Agostino Ardagna, Angelos Stavrou, Sushil ...
ESWS
2008
Springer
15 years 6 months ago
Semantic Reasoning: A Path to New Possibilities of Personalization
Abstract. Recommender systems face up to current information overload by selecting automatically items that match the personal preferences of each user. The so-called content-based...
Yolanda Blanco-Fernández, José J. Pa...
« Prev « First page 1610 / 1847 Last » Next »