Sciweavers

626 search results - page 59 / 126
» Analysing Security Requirements of Information Systems Using...
Sort
View
SIGMOD
2004
ACM
121views Database» more  SIGMOD 2004»
15 years 10 months ago
A secure hierarchical model for sensor network
In a distributed sensor network, large number of sensors deployed which communicate among themselves to selforganize a wireless ad hoc network. We propose an energyefficient level...
Malik Ayed Tubaishat, Jian Yin, Biswajit Panja, Sa...
ACSAC
2005
IEEE
15 years 3 months ago
Securing Email Archives through User Modeling
Online email archives are an under-protected yet extremely sensitive information resource. Email archives can store years worth of personal and business email in an easy-to-access...
Yiru Li, Anil Somayaji
GIS
2008
ACM
14 years 10 months ago
Towards a scalable model for location privacy
With the growth of wireless and mobile technologies, we are witnessing an increase in location-based services (LBS). Although LBS provide enhanced functionalities, they open up ne...
Nayot Poolsappasit, Indrakshi Ray
DIM
2009
ACM
15 years 2 months ago
Using identity credential usage logs to detect anomalous service accesses
For e-commerce companies providing online services, fraudulent access resulting from theft of identity credentials is a serious concern. Such online service providers deploy a var...
Daisuke Mashima, Mustaque Ahamad
JCDL
2006
ACM
152views Education» more  JCDL 2006»
15 years 3 months ago
Also by the same author: AKTiveAuthor, a citation graph approach to name disambiguation
The desire for definitive data and the semantic web drive for inference over heterogeneous data sources requires co-reference resolution to be performed on those data. In particul...
Duncan M. McRae-Spencer, Nigel R. Shadbolt