Sciweavers

135 search results - page 19 / 27
» Privacy Requirements in Identity Management Solutions
Sort
View
SIGMOD
2004
ACM
150views Database» more  SIGMOD 2004»
15 years 11 months ago
Integrating Vertical and Horizontal Partitioning Into Automated Physical Database Design
In addition to indexes and materialized views, horizontal and vertical partitioning are important aspects of physical design in a relational database system that significantly imp...
Sanjay Agrawal, Vivek R. Narasayya, Beverly Yang
MOBISYS
2008
ACM
15 years 11 months ago
Virtual trip lines for distributed privacy-preserving traffic monitoring
Automotive traffic monitoring using probe vehicles with Global Positioning System receivers promises significant improvements in cost, coverage, and accuracy. Current approaches, ...
Baik Hoh, Marco Gruteser, Ryan Herring, Jeff Ban, ...
109
Voted
MOBISEC
2009
Springer
15 years 6 months ago
Filtering SPAM in P2PSIP Communities with Web of Trust
Spam is a dominant problem on email systems today. One of the reasons is the lack of infrastructure for security and trust. As Voice over IP (VoIP) communication becomes increasing...
Juho Heikkilä, Andrei Gurtov
SOUPS
2006
ACM
15 years 5 months ago
Intentional access management: making access control usable for end-users
The usability of access control mechanisms in modern distributed systems has been widely criticized but little studied. In this paper, we carefully examine one such widely deploye...
Xiang Cao, Lee Iverson
EUROPKI
2004
Springer
15 years 5 months ago
Using EMV Cards for Single Sign-On
Abstract. At present, network users have to manage a set of authentication credentials (usually a username/password pair) for every service with which they are registered. Single S...
Andreas Pashalidis, Chris J. Mitchell