Sciweavers

883 search results - page 115 / 177
» An Access Control Model Based on Distributed Knowledge Manag...
Sort
View
93
Voted
MOBISYS
2008
ACM
16 years 5 days ago
Virtual trip lines for distributed privacy-preserving traffic monitoring
Automotive traffic monitoring using probe vehicles with Global Positioning System receivers promises significant improvements in cost, coverage, and accuracy. Current approaches, ...
Baik Hoh, Marco Gruteser, Ryan Herring, Jeff Ban, ...
96
Voted
ENTCS
2008
130views more  ENTCS 2008»
15 years 20 days ago
The SPARTA Pseudonym and Authorization System
This paper deals with privacy-preserving (pseudonymized) access to a service resource. In such a scenario, two opposite needs seem to emerge. On one side, the service provider may...
Giuseppe Bianchi, M. Bonola, Vincenzo Falletta, Fr...
SASN
2003
ACM
15 years 5 months ago
Admission control in Peer-to-Peer: design and performance evaluation
Peer-to-Peer (P2P) applications and services are very common in today’s computing. The popularity of the P2P paradigm prompts the need for specialized security services which ma...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
COORDINATION
2007
Springer
15 years 6 months ago
A Coordination Model for Triplespace Computing
Recent advances in middleware technologies propose semantics-aware tuplespaces as an instrument for coping with the requirements of scalability, heterogeneity and dynamism arising ...
Elena Paslaru Bontas Simperl, Reto Krummenacher, L...
VLDB
2006
ACM
172views Database» more  VLDB 2006»
16 years 25 days ago
Hierarchical hippocratic databases with minimal disclosure for virtual organizations
Abstract The protection of customer privacy is a fundamental issue in today's corporate marketing strategies. Not surprisingly, many research efforts have proposed new privacy...
Fabio Massacci, John Mylopoulos, Nicola Zannone