Sciweavers

128 search results - page 16 / 26
» Preventing Information Inference in Access Control
Sort
View
ACMICEC
2007
ACM
163views ECommerce» more  ACMICEC 2007»
15 years 3 months ago
Digital rights management using a mobile phone
This paper focuses on the problem of preventing illegal copying of digital assets without jeopardising the right of legitimate licence holders to transfer content between their ow...
Imad M. Abbadi, Chris J. Mitchell
CCS
2010
ACM
14 years 9 months ago
Adjustable autonomy for cross-domain entitlement decisions
Cross-domain information exchange is a growing problem, as business and governmental organizations increasingly need to integrate their information systems with those of partially...
Jacob Beal, Jonathan Webb, Michael Atighetchi
PET
2010
Springer
15 years 3 months ago
Private Information Disclosure from Web Searches
As the amount of personal information stored at remote service providers increases, so does the danger of data theft. When connections to remote services are made in the clear and ...
Claude Castelluccia, Emiliano De Cristofaro, Danie...
SECURWARE
2008
IEEE
15 years 5 months ago
Fast Algorithms for Local Inconsistency Detection in Firewall ACL Updates
Filtering is a very important issue in next generation networks. These networks consist of a relatively high number of resource constrained devices with very special features, suc...
Sergio Pozo Hidalgo, Rafael Ceballos, Rafael M. Ga...
WOWMOM
2006
ACM
109views Multimedia» more  WOWMOM 2006»
15 years 5 months ago
A Flow Control Framework for Improving Throughput and Energy Efficiency in CSMA/CA based Wireless Multihop Networks
— In multihop wireless networks where a random access MAC scheme such as CSMA/CA is used, nodes greedily compete in a distributed manner and are unaware of the interference they ...
Jaya Shankar Pathmasuntharam, Amitabha Das, Prasan...