Sciweavers

1462 search results - page 46 / 293
» Conditional Access in Mobile Systems: Securing the Applicati...
Sort
View
IJCNLP
2004
Springer
15 years 5 months ago
Spoken Versus Written Queries for Mobile Information Access: An Experiment on Mandarin Chinese
As Chinese is not alphabetic and the input of Chinese characters into computer is still a difficult and unsolved problem, voice retrieval of information becomes apparently an imp...
Heather Du, Fabio Crestani
WWW
2011
ACM
14 years 6 months ago
A middleware for securing mobile mashups
Mashups on traditional desktop devices are a well-known source of security risks. In this paper, we examine how these risks translate to mobile mashups and identify new risks caus...
Florent Batard, Karima Boudaoud, Michel Riveill
VLDB
2002
ACM
74views Database» more  VLDB 2002»
14 years 11 months ago
Provisions and Obligations in Policy Management and Security Applications
Policies are widely used in many systems and applications. Recently, it has been recognized that a "yes/no" response to every scenario is just not enough for many modern...
Claudio Bettini, Sushil Jajodia, Xiaoyang Sean Wan...
DEBS
2007
ACM
15 years 3 months ago
Encryption-enforced access control in dynamic multi-domain publish/subscribe networks
Publish/subscribe systems provide an efficient, event-based, wide-area distributed communications infrastructure. Large scale publish/subscribe systems are likely to employ compon...
Lauri I. W. Pesonen, David M. Eyers, Jean Bacon
DBSEC
2009
163views Database» more  DBSEC 2009»
15 years 27 days ago
A Trust-Based Access Control Model for Pervasive Computing Applications
With the rapid growth in wireless networks and sensor and mobile devices, we are moving towards an era of pervasive computing. Access control is challenging in these environments. ...
Manachai Toahchoodee, Ramadan Abdunabi, Indrakshi ...