Sciweavers

246 search results - page 48 / 50
» Middleware support for protecting personal data from web bas...
Sort
View
IDT
2008
123views more  IDT 2008»
13 years 6 months ago
A rich semantic model of track as a foundation for sharing beliefs regarding dynamic objects and events
: Many defense, homeland security, and commercial security objectives require continuous tracking of mobile entities such as aircraft. The systems that perform these functions prod...
Frederick Hayes-Roth, Curtis L. Blais
IDTRUST
2009
ACM
14 years 1 months ago
Usable secure mailing lists with untrusted servers
Mailing lists are a natural technology for supporting messaging in multi-party, cross-domain collaborative tasks. However, whenever sensitive information is exchanged on such list...
Rakeshbabu Bobba, Joe Muggli, Meenal Pant, Jim Bas...
AAAI
1997
13 years 7 months ago
PST: The Provider Selection Tool
Oxford Health Plans, Inc. is a managed care organization whose goal is to deliver cost-effective, high-quality health care. Oxford’s product lines include traditional health mai...
Howard Marmorstein, Jayesh Ghia, Sandeep Sathaye, ...
ACSAC
2007
IEEE
14 years 18 days ago
SSARES: Secure Searchable Automated Remote Email Storage
The increasing centralization of networked services places user data at considerable risk. For example, many users store email on remote servers rather than on their local disk. D...
Adam J. Aviv, Michael E. Locasto, Shaya Potter, An...
MOBICOM
2004
ACM
13 years 11 months ago
Choosing beacon periods to improve response times for wireless HTTP clients
The IEEE 802.11 wireless LAN standard power-saving mode (PSM) allows the network interface card (NIC) to periodically sleep between receiving data. In this paper, we show that 802...
Suman Nath, Zachary R. Anderson, Srinivasan Seshan