Sciweavers

490 search results - page 78 / 98
» Enabling User Control with Personal Identity Management
Sort
View
WWW
2007
ACM
16 years 4 months ago
Mobile shopping assistant: integration of mobile applications and web services
The goal of this poster is to describe our implementation of a new architecture enabling efficient integration between mobile phone applications and Web Services. Using this archi...
Huaigu Wu, Yuri Natchetoi
SP
1996
IEEE
121views Security Privacy» more  SP 1996»
15 years 8 months ago
A Security Policy Model for Clinical Information Systems
The protection of personal health information has become a live issue in a number of countries including the USA, Canada, Britain and Germany. The debate has shown that there is w...
Ross J. Anderson
COMCOM
2006
77views more  COMCOM 2006»
15 years 4 months ago
SIP as a unified signalling solution in a beyond 3G system
The adoption of packet-switched technologies in mobile communication systems has enabled the provision of IPbased services to mobile users. Yet, these systems, such as the UMTS net...
Vaggelis Nikas, Georgios V. Lioudakis, Nikolaos L....
RECSYS
2009
ACM
15 years 10 months ago
An incentive-based architecture for social recommendations
We present an incentive-based architecture for providing recommendations in a social network. We maintain a distinct reputation system for each individual and we rely on users to ...
Rajat Bhattacharjee, Ashish Goel, Konstantinos Kol...
SOSP
2003
ACM
16 years 24 days ago
Model-carrying code: a practical approach for safe execution of untrusted applications
This paper presents a new approach called model-carrying code (MCC) for safe execution of untrusted code. At the heart of MCC is the idea that untrusted code comes equipped with a...
R. Sekar, V. N. Venkatakrishnan, Samik Basu, Sande...