Sciweavers

194 search results - page 7 / 39
» A Protection Scheme for Collaborative Environments
Sort
View
COMPSAC
2009
IEEE
15 years 2 months ago
A Privacy Enhancing Approach for Identity Inference Protection in Location-Based Services
—Recent advances in mobile handheld devices have facilitated the ubiquitous availability of location based services. Systems which provide location based services have always bee...
Chowdhury Sharif Hasan, Sheikh Iqbal Ahamed, Moham...
MAS
1998
Springer
152views Communications» more  MAS 1998»
15 years 1 months ago
D'Agents: Security in a Multiple-Language, Mobile-Agent System
Abstract. Mobile-agent systems must address three security issues: protecting an individual machine, protecting a group of machines, and protecting an agent. In this chapter, we di...
Robert S. Gray, David Kotz, George Cybenko, Daniel...
JPDC
2006
141views more  JPDC 2006»
14 years 9 months ago
M-TREE: A high efficiency security architecture for protecting integrity and privacy of software
Secure processor architectures enable new sets of applications such as commercial grid computing, software copy protection and secure mobile agents by providing secure computing e...
Chenghuai Lu, Tao Zhang, Weidong Shi, Hsien-Hsin S...
PERCOM
2004
ACM
15 years 9 months ago
Supporting Persistent Social Groups in Ubiquitous Computing Environments Using Context-Aware Ephemeral Group Service
In this paper, we analyze the role of the social group in a Ubiquitous Computing (Ubicomp) environment as a source of contextual information. A model is presented to address the s...
Bin Wang, John Bodily, Sandeep K. S. Gupta
EUC
2004
Springer
15 years 3 months ago
A Collaborative and Semantic Data Management Framework for Ubiquitous Computing Environment
One fundamental task to realize the envisioned ubiquitous computing paradigm is the proper management of the data generated in this environment. The special characteristics of high...
Weisong Chen, Cho-Li Wang, Francis C. M. Lau