Sciweavers

147 search results - page 7 / 30
» Towards a Component based Privacy Protector Architecture
Sort
View

Tutorial
2179views
16 years 9 months ago
Privacy in Location-Based Services: State-of-the-Art and Research Directions
The explosive growth of location-detection devices (e.g., GPS-like devices and handheld devices) along with wireless communications and mobile databases results in realizing locati...
Mohamed F. Mokbel
TEAA
2005
Springer
126views Hardware» more  TEAA 2005»
15 years 2 months ago
Towards a Secure Data Stream Management System
Abstract. Todays data stream management systems (DSMSs) lack security functionality. Based on adversary scenarios we show how a DSMS architecture can be protected. We sketch a gene...
Wolfgang Lindner, Jörg Meier
CCS
2009
ACM
15 years 4 months ago
Towards secure dataflow processing in open distributed systems
Open distributed systems such as service oriented architecture and cloud computing have emerged as promising platforms to deliver software as a service to users. However, for many...
Juan Du, Wei Wei, Xiaohui Gu, Ting Yu
NORDSEC
2009
Springer
15 years 4 months ago
A Parallelism-Based Approach to Network Anonymization
Considering topologies of anonymous networks we used to organizing anonymous communications into hard to trace paths, composed of several middleman nodes, towards hiding communicat...
Igor Margasinski
CSFW
2005
IEEE
15 years 3 months ago
An Encapsulated Authentication Logic for Reasoning about Key Distribution Protocols
Authentication and secrecy properties are proved by very different methods: the former by local reasoning, leading to matching knowledge of all principals about the order of their...
Iliano Cervesato, Catherine Meadows, Dusko Pavlovi...