Sciweavers

744 search results - page 26 / 149
» The Traust Authorization Service
Sort
View
TRUSTBUS
2005
Springer
15 years 3 months ago
A Privacy Enhancement Mechanism for Location Based Service Architectures Using Transaction Pseudonyms
Abstract. Third party service providers are starting to use advanced location services based on area or periodical notification in order to develop innovative applications. Howeve...
Oliver Jorns, Oliver Jung, Julia Gross, Sandford B...
EICS
2010
ACM
14 years 11 months ago
Service discovery supported by task models
We propose an approach that takes as input a task model, which includes the user's view of the interactive system, and automatically discovers a set of categorized and ranked...
Kyriakos Kritikos, Fabio Paternò
TWC
2008
112views more  TWC 2008»
14 years 9 months ago
Service time analysis of a distributed medium access control scheme
Abstract--Distributed medium access control (MAC) is essential for a wireless network without a central controller. In previous work of the authors, a distributed MAC scheme has be...
Hai Jiang, Ping Wang, Weihua Zhuang, H. Vincent Po...
ESWS
2009
Springer
15 years 4 months ago
Middleware for Automated Implementation of Security Protocols
We propose a middleware for automated implementation of security protocols for Web services. The proposed middleware consists of two main layers: the communication layer and the se...
Béla Genge, Piroska Haller
PET
2007
Springer
15 years 3 months ago
Louis, Lester and Pierre: Three Protocols for Location Privacy
Abstract. Location privacy is of utmost concern for location-based services. It is the property that a person’s location is revealed to other entities, such as a service provider...
Ge Zhong, Ian Goldberg, Urs Hengartner