Sciweavers

2335 search results - page 308 / 467
» Securing Distributed Systems with Information Flow Control
Sort
View
110
Voted
SACMAT
2003
ACM
15 years 7 months ago
On context in authorization policy
Authorization policy infrastructures are evolving with the complex environments that they support. However, the requirements and technologies supporting context are not yet well u...
Patrick Drew McDaniel
90
Voted
ESORICS
2009
Springer
16 years 3 months ago
The Wisdom of Crowds: Attacks and Optimal Constructions
We present a traffic analysis of the ADU anonymity scheme presented at ESORICS 2008, and the related RADU scheme. We show that optimal attacks are able to de-anonymize messages mor...
Carmela Troncoso, Claudia Díaz, Emilia K&au...
121
Voted
HPCC
2005
Springer
15 years 8 months ago
A SMS Based Ubiquitous Home Care System
In this study, we defined requirements of ubiquitous environment, which users can monitor and control situations of home anytime, anywhere. In addition we developed and built a mod...
Tae-Seok Lee, Yuan Yang, Myong-Soon Park
119
Voted
IROS
2006
IEEE
177views Robotics» more  IROS 2006»
15 years 8 months ago
Adaptive Control of Heterogeneous Marine Sensor Platforms in an Autonomous Sensor Network
Abstract— This paper describes an investigation into the control of autonomous mobile sensor platforms in a marine sensor network used to provide monitoring of transitory phenome...
Donald P. Eickstedt, Michael R. Benjamin, Henrik S...
121
Voted
WPES
2004
ACM
15 years 8 months ago
Will your digital butlers betray you?
The cost of data storage is now so low that there is little necessity ever to delete anything. The consequence is denied oblivion—digital systems that remember forever and can b...
Frank Stajano