Sciweavers

517 search results - page 99 / 104
» Distributed Authentication in GRID5000
Sort
View
117
Voted
SSS
2009
Springer
195views Control Systems» more  SSS 2009»
15 years 10 months ago
Anonymous Transactions in Computer Networks
Abstract. We present schemes for providing anonymous transactions while privacy and anonymity are preserved, providing user anonymous authentication in distributed networks such as...
Shlomi Dolev, Marina Kopeetsky
169
Voted
IMC
2009
ACM
15 years 10 months ago
Characterizing user behavior in online social networks
Understanding how users behave when they connect to social networking sites creates opportunities for better interface design, richer studies of social interactions, and improved ...
Fabrício Benevenuto, Tiago Rodrigues, Meeyo...
MDM
2007
Springer
125views Communications» more  MDM 2007»
15 years 9 months ago
Extending P3P/Appel for Friend Finder
FriendFinder as a location-based service collects location data from mobile users and distributes a particular user’s location upon request. Privacy of users data especially loc...
Emin Islam Tatli
143
Voted
CCGRID
2006
IEEE
15 years 9 months ago
A Shibboleth-Protected Privilege Management Infrastructure for e-Science Education
Simplifying access to and usage of large scale compute resources via the Grid is of critical importance to encourage the uptake of e-Research. Security is one aspect that needs to...
J. P. Watt, Oluwafemi Ajayi, Jipu Jiang, Jos Koets...
130
Voted
RTCSA
2006
IEEE
15 years 9 months ago
Systematic Security and Timeliness Tradeoffs in Real-Time Embedded Systems
Real-time embedded systems are increasingly being networked. In distributed real-time embedded applications, e.g., electric grid management and command and control applications, i...
Kyoung-Don Kang, Sang Hyuk Son