Sciweavers

2454 search results - page 167 / 491
» Privacy in the Information and Communications Technologies
Sort
View
ACSAC
1999
IEEE
15 years 6 months ago
A Distributed Certificate Management System (DCMS) Supporting Group-Based Access Controls
Mainly for scalability reasons, many cryptographic security protocols make use of public key cryptography and require the existence of a corresponding public key infrastructure (P...
Rolf Oppliger, Andreas Greulich, Peter Trachsel
AMW
2011
14 years 5 months ago
Private Database Synthesis for Outsourced System Evaluation
The goal of this paper is to permit secure outsourced system evaluation. We propose a method for generating synthetic databases and obfuscating a workload of queries in order to pr...
Vani Gupta, Gerome Miklau, Neoklis Polyzotis
TPDS
2010
99views more  TPDS 2010»
15 years 11 hour ago
Snoogle: A Search Engine for Pervasive Environments
—Embedding small devices into everyday objects like toasters and coffee mugs creates a wireless network of objects. These embedded devices can contain a description of the underl...
Haodong Wang, Chiu Chiang Tan, Qun Li
CIKM
1994
Springer
15 years 5 months ago
Semantics-Based Information Brokering
The rapid advances in computer and communication technologies, and their merger, is leading to a global information market place. It will consist of federations of very large numb...
Vipul Kashyap, Amit P. Sheth
IV
2007
IEEE
109views Visualization» more  IV 2007»
15 years 8 months ago
Visualization Criticism - The Missing Link Between Information Visualization and Art
Classifications of visualization are often based on technical criteria, and leave out artistic ways of visualizing information. Understanding the differences between information ...
Robert Kosara