Sciweavers

3544 search results - page 71 / 709
» Information Security in Open Systems
Sort
View
ESORICS
2009
Springer
15 years 5 months ago
Access Control in Location-Based Services
Recent enhancements in location technologies reliability and precision are fostering the development of a new wave of applications that make use of the location information of user...
Claudio Agostino Ardagna, Marco Cremonini, Sabrina...
CSREAEEE
2006
141views Business» more  CSREAEEE 2006»
15 years 12 days ago
Integrating the Learning Management System with other Online Administrative Systems at AOU
- This paper follows the progress of improving the Arab Open University's Learning Management System by integrating it with other online systems, such as the university's...
Bayan Abu Shawar, Jehad Al-Sadi, Amr Hourani
CCS
2008
ACM
15 years 1 months ago
Efficiently tracking application interactions using lightweight virtualization
In this paper, we propose a general-purpose framework that harnesses the power of lightweight virtualization to track applications interactions in a scalable an efficient manner. ...
Yih Huang, Angelos Stavrou, Anup K. Ghosh, Sushil ...
ATAL
2003
Springer
15 years 4 months ago
Role-assignment in open agent societies
Open systems are characterized by heterogeneous participants which can enter or leave the system at will. Typical examples are e-commerce applications or information agent systems...
Mehdi Dastani, Virginia Dignum, Frank Dignum
P2P
2003
IEEE
157views Communications» more  P2P 2003»
15 years 4 months ago
TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P Systems
Decentralized Peer to Peer (P2P) networks offer both opportunities and threats. Its open and decentralized nature makes it extremely susceptible to malicious users spreading harmf...
Aameek Singh, Ling Liu