Sciweavers

490 search results - page 41 / 98
» Enabling User Control with Personal Identity Management
Sort
View
110
Voted
DRM
2003
Springer
15 years 5 months ago
Digital rights management in a 3G mobile phone and beyond
In this paper we examine how copyright protection of digital items can be securely managed in a 3G mobile phone and other devices. First, the basic concepts, strategies, and requi...
Thomas S. Messerges, Ezzat A. Dabbish
92
Voted
WPES
2005
ACM
15 years 6 months ago
Anonymous yet accountable access control
This paper introduces a novel approach for augmenting attributebased access control systems in a way that allows them to offer fully anonymous access to resources while at the sam...
Michael Backes, Jan Camenisch, Dieter Sommer
91
Voted
DAIS
2009
15 years 1 months ago
Dependency Management in Smart Homes
In future smart homes functionality will be provided to the inhabitants by software services decoupled from the underlying hardware devices. While this will enhance flexibility and...
Daniel Retkowitz, Sven Kulle
111
Voted
PVLDB
2010
172views more  PVLDB 2010»
14 years 11 months ago
Secure Personal Data Servers: a Vision Paper
An increasing amount of personal data is automatically gathered and stored on servers by administrations, hospitals, insurance companies, etc. Citizen themselves often count on in...
Tristan Allard, Nicolas Anciaux, Luc Bouganim, Yan...
QOFIS
2000
Springer
15 years 4 months ago
Random Early Marking
In this paper we present an optimisation approach to congestion flow control. The initial context of this approach was as a rate based flow control in ATM networks. We describe te...
Sanjeewa Athuraliya, Steven H. Low, David E. Lapsl...