Sciweavers

744 search results - page 33 / 149
» The Traust Authorization Service
Sort
View
TDSC
2011
14 years 4 months ago
SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks
—Anonymity has received increasing attention in the literature due to the users’ awareness of their privacy nowadays. Anonymity provides protection for users to enjoy network s...
Jinyuan Sun, Chi Zhang, Yanchao Zhang, Yuguang Fan...
MDM
2007
Springer
15 years 3 months ago
A Comparison of Spatial Generalization Algorithms for LBS Privacy Preservation
Spatial generalization has been recently proposed as a technique for the anonymization of requests in location based services. This paper presents the results of an extensive expe...
Sergio Mascetti, Claudio Bettini
ACISP
1997
Springer
15 years 1 months ago
A Method to Implement a Denial of Service Protection Base
Denial of service attack is an attempt from any authorized or unauthorized entity to allocate resources excessively to prevent normal operation of the system. A method will be pres...
Jussipekka Leiwo, Yuliang Zheng
JNW
2007
80views more  JNW 2007»
14 years 9 months ago
Providing Security Services in a Resource Discovery System
— Nowadays, portable electronic devices allow users to access available resources wherever they are. In this sense, announcement and discovering of services and resources are two...
Juan Vera del Campo, Josep Pegueroles, Miguel Sori...
CSREAEEE
2006
103views Business» more  CSREAEEE 2006»
14 years 11 months ago
Mobile Web Service Architecture for Software Development Peer Inspection
- Improving software quality remains a key challenge. Software development formal peer inspection has emerged as an effective approach to address this challenge. Software peer insp...
Gilda Pour, Ashwini Ramachandra, Panchali Sarkar