Sciweavers

1402 search results - page 196 / 281
» Personalized privacy preservation
Sort
View
110
Voted
P2P
2008
IEEE
15 years 7 months ago
Peer-to-Peer Secure Multi-party Numerical Computation
We propose an efficient framework for enabling secure multi-party numerical computations in a Peer-to-Peer network. This problem arises in a range of applications such as collabo...
Danny Bickson, Danny Dolev, Genia Bezman, Benny Pi...
ACSAC
2002
IEEE
15 years 5 months ago
Access Control for Active Spaces
Active Spaces are physical spaces augmented with heterogeneous computing and communication devices along with supporting software infrastructure. This integration facilitates coll...
Geetanjali Sampemane, Prasad Naldurg, Roy H. Campb...
CCS
2006
ACM
15 years 4 months ago
Safety and consistency in policy-based authorization systems
In trust negotiation and other distributed proving systems, networked entities cooperate to form proofs that are justified by collections of certified attributes. These attributes...
Adam J. Lee, Marianne Winslett
88
Voted
PERCOM
2005
ACM
16 years 5 days ago
Towards seamless mobility on pervasive hardware
Preserving one's uniquely customized computing environment as one moves to different locations is an enduring challenge in mobile computing. We examine why this capability is...
Mahadev Satyanarayanan, Michael Kozuch, Casey Helf...
90
Voted
SAC
2009
ACM
15 years 7 months ago
Building an efficient preference XML query processor
Today user-centered information acquisition over collections of complex XML documents is increasingly in demand. To this end, preferences have become an important paradigm enablin...
SungRan Cho, Wolf-Tilo Balke