Sciweavers

331 search results - page 12 / 67
» Structuring Protocol Implementations to Protect Sensitive Da...
Sort
View
SACMAT
2004
ACM
15 years 4 months ago
Implementing access control to people location information
Ubiquitous computing uses a variety of information for which access needs to be controlled. For instance, a person’s current location is a sensitive piece of information, which ...
Urs Hengartner, Peter Steenkiste
ICC
2007
IEEE
117views Communications» more  ICC 2007»
15 years 5 months ago
Price Negotiation Systems for M-commerce
— As content delivery to wireless devices becomes faster and scalable, it is likely that mobile commerce will constitute a significant portion of digital commerce. In markets, b...
Huafei Zhu, Feng Bao, A. Lakshminarayanan
IJSEKE
2000
111views more  IJSEKE 2000»
14 years 10 months ago
An Approach to Quantitative Software Architecture Sensitivity Analysis
Software architectures are often claimed to be robust. However, there is no explicit and concrete definition of software architecture robustness. This paper gives a definition of ...
Chung-Horng Lung, Kalai Kalaichelvan
ACSC
2003
IEEE
15 years 4 months ago
Context-Sensitive Mobile Database Summarisation
In mobile computing environments, as a result of the reduced capacity of local storage, it is commonly not feasible to replicate entire datasets on each mobile unit. In addition, ...
Darin Chan, John F. Roddick
ICDM
2007
IEEE
135views Data Mining» more  ICDM 2007»
15 years 5 months ago
Private Inference Control for Aggregate Database Queries
Data security is a critical issue for many organizations. Sensitive data must be protected from both inside and outside attackers. Access control policies and related mechanisms h...
Geetha Jagannathan, Rebecca N. Wright