Sciweavers

339 search results - page 58 / 68
» A reputation-based trust management system for P2P networks
Sort
View
WISEC
2010
ACM
15 years 20 days ago
Mobile user location-specific encryption (MULE): using your office as your password
Data breaches due to stolen laptops are a major problem. Solutions exist to secure sensitive files on laptops, but are rarely deployed because users view them as inconvenient. Thi...
Ahren Studer, Adrian Perrig
ACMICEC
2007
ACM
163views ECommerce» more  ACMICEC 2007»
15 years 4 months ago
Digital rights management using a mobile phone
This paper focuses on the problem of preventing illegal copying of digital assets without jeopardising the right of legitimate licence holders to transfer content between their ow...
Imad M. Abbadi, Chris J. Mitchell
99
Voted
ATAL
2007
Springer
15 years 6 months ago
Managing the pedigree and quality of information in dynamic information sharing environments
The quality of information is crucial for decision making in many mission-critical applications such as battlefield operations and intelligence analysis. However, as the system b...
Bin Yu, Srikanth Kallurkar, Ganesh Vaidyanathan, D...
105
Voted
PERCOM
2007
ACM
16 years 2 days ago
Middleware for Secure Home Access and Control
User adaptive systems in the context of pervasive computing can only unveil their power if based on a generic middleware managing private data and context information in combinati...
Andrés Marín López, Wolfgang ...
104
Voted
SAC
2009
ACM
15 years 7 months ago
Secure web-based retrieval of documents with usage controls
Usage controls enable the provider of some information to limit how recipients may use it. Usage controls may be desirable in enterprise environments, e.g., for regulatory complia...
Peter Djalaliev, José Carlos Brustoloni