Sciweavers

45 search results - page 2 / 9
» MarketNet: Using Virtual Currency to Protect Information Sys...
Sort
View
ICDS
2009
IEEE
14 years 3 days ago
Self Protecting Data for De-perimeterised Information Sharing
- The emergence of high-speed networks, Grid Computing, Service-Oriented Architectures, and an ever increasing ambient connection to mobile Internet has enabled an underpinning inf...
Pete Burnap, Jeremy Hilton
SRDS
2010
IEEE
13 years 3 months ago
Protection of Identity Information in Cloud Computing without Trusted Third Party
Cloud computing allows the use of Internet-based services to support business processes and rental of IT-services on a utility-like basis. It offers a concentration of resources bu...
Rohit Ranchal, Bharat K. Bhargava, Lotfi Ben Othma...
EUROSYS
2008
ACM
14 years 2 months ago
Protectit: trusted distributed services operating on sensitive data
Protecting shared sensitive information is a key requirement for today’s distributed applications. Our research uses virtualization technologies to create and maintain trusted d...
Jiantao Kong, Karsten Schwan, Min Lee, Mustaque Ah...
IEEEIAS
2009
IEEE
13 years 12 months ago
Privacy Protection for Speech Information
—Ubiquitous network society will be achieved soon. In the society, all electronic equipments including “sensors” are connected to the network and communicate each other to sh...
Kazumasa Yamamoto, Seiichi Nakagawa
COLCOM
2007
IEEE
13 years 7 months ago
Using context to assist the adaptation of protected multimedia content in virtual collaboration applications
—This paper proposes a framework for a virtual classroom application based on a Virtual Collaboration System (VCS), which is being developed under the VISNET II Network of Excell...
Maria Teresa Andrade, Hemantha Kodikara Arachchi, ...