Sciweavers

1286 search results - page 157 / 258
» A Practical Modelling Notation for Secure Distributed Comput...
Sort
View
CONCUR
2001
Springer
15 years 5 months ago
Probabilistic Information Flow in a Process Algebra
We present a process algebraic approach for extending to the probabilistic setting the classical logical information flow analysis of computer systems. In particular, we employ a ...
Alessandro Aldini
DCOSS
2006
Springer
15 years 4 months ago
Locating Compromised Sensor Nodes Through Incremental Hashing Authentication
Abstract. While sensor networks have recently emerged as a promising computing model, they are vulnerable to various node compromising attacks. In this paper, we propose COOL, a CO...
Youtao Zhang, Jun Yang 0002, Lingling Jin, Weijia ...
97
Voted
GI
2009
Springer
14 years 10 months ago
Selling the Aether - A New Billing Schema for Mobile Advertising
: The ubiquity and personalization of mobile phones makes them a promising platform for advertising. Currently, practices known from online advertisement can be adapted, e.g. conte...
Matthias Böhmer, Gernot Bauer
115
Voted
MIDDLEWARE
2007
Springer
15 years 6 months ago
Middleware support for protecting personal data from web based data services
Web based data services are very popular with the average computer user. Examples of such services include Gmail.com, Yahoo Photos, Yahoo Briefcase and Amazon S3 Service. In such ...
Ravi Chandra Jammalamadaka
116
Voted
SACMAT
2003
ACM
15 years 6 months ago
The role control center: features and case studies
Role-based Access Control (RBAC) models have been implemented not only in self-contained resource management products such as DBMSs and Operating Systems but also in a class of pr...
David F. Ferraiolo, Ramaswamy Chandramouli, Gail-J...