Sciweavers

2846 search results - page 528 / 570
» Personalization of a Trust Network
Sort
View
ANCS
2009
ACM
14 years 10 months ago
Progressive hashing for packet processing using set associative memory
As the Internet grows, both the number of rules in packet filtering databases and the number of prefixes in IP lookup tables inside the router are growing. The packet processing e...
Michel Hanna, Socrates Demetriades, Sangyeun Cho, ...
SACMAT
2011
ACM
14 years 3 months ago
An integrated approach for identity and access management in a SOA context
In this paper, we present an approach for identity and access management (IAM) in the context of (cross-organizational) serviceoriented architectures (SOA). In particular, we deļ¬...
Waldemar Hummer, Patrick Gaubatz, Mark Strembeck, ...
125
Voted
SIGMOD
2011
ACM
179views Database» more  SIGMOD 2011»
14 years 3 months ago
No free lunch in data privacy
Differential privacy is a powerful tool for providing privacypreserving noisy query answers over statistical databases. It guarantees that the distribution of noisy query answers...
Daniel Kifer, Ashwin Machanavajjhala
118
Voted
CCS
2011
ACM
14 years 13 days ago
Cirripede: circumvention infrastructure using router redirection with plausible deniability
Many users face surveillance of their Internet communications and a significant fraction suffer from outright blocking of certain destinations. Anonymous communication systems a...
Amir Houmansadr, Giang T. K. Nguyen, Matthew Caesa...
109
Voted
HUC
2011
Springer
14 years 3 days ago
Are you close with me? are you nearby?: investigating social groups, closeness, and willingness to share
As ubiquitous computing becomes increasingly mobile and social, personal information sharing will likely increase in frequency, the variety of friends to share with, and range of ...
Jason Wiese, Patrick Gage Kelley, Lorrie Faith Cra...