Sciweavers

744 search results - page 92 / 149
» The Traust Authorization Service
Sort
View
INFOCOM
2010
IEEE
14 years 8 months ago
Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing
—Cloud computing is an emerging computing paradigm in which resources of the computing infrastructure are provided as services over the Internet. As promising as it is, this para...
Shucheng Yu, Cong Wang, Kui Ren, Wenjing Lou
INFOCOM
2010
IEEE
14 years 8 months ago
Socially-Aware Network Design Games
—In many scenarios network design is not enforced by a central authority, but arises from the interactions of several self-interested agents. This is the case of the Internet, wh...
Jocelyne Elias, Fabio Martignon, Konstantin Avrach...
TMC
2010
115views more  TMC 2010»
14 years 8 months ago
Controlled Wi-Fi Sharing in Cities: A Decentralized Approach Relying on Indirect Reciprocity
—In densely populated cities, Wi-Fi networks—private or otherwise—are ubiquitous. We focus on the provision of citywide broadband communication capability to mobile users thr...
Elias C. Efstathiou, Pantelis A. Frangoudis, Georg...
ACSAC
2010
IEEE
14 years 8 months ago
Porscha: policy oriented secure content handling in Android
The penetration of cellular networks worldwide and emergence of smart phones has led to a revolution in mobile content. Users consume diverse content when, for example, exchanging...
Machigar Ongtang, Kevin R. B. Butler, Patrick Drew...
CN
2011
127views more  CN 2011»
14 years 4 months ago
A game theoretic analysis of network design with socially-aware users
In many scenarios network design is not enforced by a central authority, but arises from the interactions of several self-interested agents. This is the case of the Internet, wher...
Jocelyne Elias, Fabio Martignon, Konstantin Avrach...