Sciweavers

1462 search results - page 56 / 293
» Conditional Access in Mobile Systems: Securing the Applicati...
Sort
View
ECOOPW
1998
Springer
15 years 6 months ago
Role-Based Protection and Delegation for Mobile Object Environments
PrincipalDomain is an administrative scoping construct for establishing security policies based on the principals invoking object services that may entail objects moving around a ...
Nataraj Nagaratnam, Doug Lea
JITT
2011
177views more  JITT 2011»
14 years 9 months ago
Mobile Recommender Systems
Mobile phones are becoming a primary platform for information access and when coupled with recommender systems technologies they can become key tools for mobile users both for lei...
Francesco Ricci
LOCA
2005
Springer
15 years 7 months ago
Classifying the Mobility of Users and the Popularity of Access Points
Abstract. There is increasing interest in location-aware systems and applications. It is important for any designer of such systems and applications to understand the nature of use...
Minkyong Kim, David Kotz
SOUPS
2009
ACM
15 years 8 months ago
Social applications: exploring a more secure framework
Online social network sites, such as MySpace, Facebook and others have grown rapidly, with hundreds of millions of active users. A new feature on many sites is social applications...
Andrew Besmer, Heather Richter Lipford, Mohamed Sh...
DBSEC
2010
162views Database» more  DBSEC 2010»
15 years 3 months ago
Distributed and Secure Access Control in P2P Databases
The intent of peer data management systems (PDMS) is to share as much data as possible. However, in many applications leveraging sensitive data, users demand adequate mechanisms to...
Angela Bonifati, Ruilin Liu, Hui (Wendy) Wang