Sciweavers

3299 search results - page 158 / 660
» Privacy and Trusted Computing
Sort
View
GIS
2010
ACM
15 years 3 months ago
Moving forward: location privacy and location awareness
ended abstract looks forward at which shared concepts and approaches are shaping future research in the field of location privacy, as well as reflecting on the broader achievement...
Matt Duckham
151
Voted
CCS
2011
ACM
14 years 5 months ago
Trust-based anonymous communication: adversary models and routing algorithms
We introduce a novel model of routing security that incorporates the ordinarily overlooked variations in trust that users have for different parts of the network. We focus on ano...
Aaron Johnson, Paul F. Syverson, Roger Dingledine,...
COLCOM
2007
IEEE
15 years 11 months ago
Towards trust-aware access management for ad-hoc collaborations
—In an ad-hoc collaborative sharing environment, attribute-based access control provides a promising approach in defining authorization over shared resources based on users’ p...
Jing Jin, Gail-Joon Ahn, Mohamed Shehab, Hongxin H...
GCC
2005
Springer
15 years 10 months ago
A Routing Protocol Based on Trust for MANETs
Abstract. Ad hoc network is a peer-to-peer grid system. The combination of the Knowledge Grid and ad hoc network could have a great effect on the future interconnection environment...
Cuirong Wang, Xiaozong Yang, Yuan Gao
WAC
2005
Springer
122views Communications» more  WAC 2005»
15 years 10 months ago
Trust Management Issues for Ad Hoc and Self-organized Networks
Self-organized and ad hoc communications have many fundamental principles in common and also face similar problems in the domains of security and Quality of Service. Trust manageme...
Vassileios Tsetsos, Giannis F. Marias, Sarantis Pa...