Sciweavers

1351 search results - page 223 / 271
» Trust in Anonymity Networks
Sort
View
POLICY
2007
Springer
15 years 3 months ago
Towards Practical Security Monitors of UML Policies for Mobile Applications
—There is increasing demand for running interacting applications in a secure and controllable way on mobile devices. Such demand is not fully supported by the Java/.NET security ...
Fabio Massacci, Katsiaryna Naliuka
INFOCOM
2003
IEEE
15 years 3 months ago
Cooperative Peer Groups in NICE
Abstract— We present a distributed scheme for trust inference in peer-to-peer networks. Our work is in context of the NICE system, which is a platform for implementing cooperativ...
Seungjoon Lee, Rob Sherwood, Samrat Bhattacharjee
ICICS
2003
Springer
15 years 3 months ago
Practical Service Charge for P2P Content Distribution
With emerging decentralized technologies, peer-to-peer (P2P) content distribution arises as a new model for storage and transmission of data. In this scenario, one peer can be play...
Jose Antonio Onieva, Jianying Zhou, Javier Lopez
LISA
2007
15 years 3 days ago
OS Circular: Internet Client for Reference
OS Circular is a framework for Internet Disk Image Distribution of software for virtual machines, those which offer a ‘‘virtualized’’ common PC environment on any PC. OS i...
Kuniyasu Suzaki, Toshiki Yagi, Kengo Iijima, Anh-Q...
ESORICS
2008
Springer
14 years 11 months ago
Location Privacy in Location-Based Services: Beyond TTP-based Schemes
Location-Based Services (LBS) are gaining importance due to the advances in mobile networks and positioning technologies. Nevertheless, the wide deployment of LBS can jeopardise th...
Agusti Solanas, Josep Domingo-Ferrer, Antoni Mart&...