Sciweavers

828 search results - page 99 / 166
» Access Control in Location-Based Services
Sort
View
PERCOM
2005
ACM
15 years 9 months ago
A Capability-Based Privacy-Preserving Scheme for Pervasive Computing Environments
Pervasive computing is a future technology that provides a user with the capability to compute and communicate from everywhere. In a pervasive computing environment, a user interac...
Divyan M. Konidala, Dang Nguyen Duc, Dongman Lee, ...
COMCOM
1998
74views more  COMCOM 1998»
14 years 9 months ago
Using proxies to enhance TCP performance over hybrid fiber coaxial networks
Using cable modems that operate at several hundred times the speed of conventional telephone modems, many cable operators are beginning to offer World Wide Web access and other da...
Reuven Cohen, Srinivas Ramanathan
MOBICOM
1998
ACM
15 years 2 months ago
On Programmable Universal Mobile Channels in a Cellular Internet
In this paper we introduce universal mobile channels, a le communications abstraction that enables users and service providers to program application-speci c adaptive mobile servi...
Raymond R.-F. Liao, Andrew T. Campbell
EGC
2005
Springer
15 years 3 months ago
Security Architecture for Open Collaborative Environment
Abstract. The paper presents proposed Security Architecture for Open Collaborative Environment (OCE) being developed in the framework of the Collaboratory.nl (CNL) project with the...
Yuri Demchenko, Leon Gommans, Cees de Laat, Bas va...
IADIS
2004
14 years 11 months ago
Preliminary Steps in Designing and Implementing a Privilege Verifier for PMI
We have designed and deployed a system that uses X.509 public-key certificates (PKC) and attribute certificates (AC) for access control. This includes an authorization service for...
Diana Berbecaru, Antonio Lioy