-
2
-
-
10944251971
-
Data obfuscation: Anonymity and desensitization of usable data sets
-
November/December
-
D. E. Bakken, R. Parameswaran, D. M. Blough, A. A. Franz, and T. J. Palmer. Data obfuscation: Anonymity and desensitization of usable data sets. IEEE Security and Privacy, 2(6):34-41, November/December 2004.
-
(2004)
IEEE Security and Privacy
, vol.2
, Issue.6
, pp. 34-41
-
-
Bakken, D.E.1
Parameswaran, R.2
Blough, D.M.3
Franz, A.A.4
Palmer, T.J.5
-
8
-
-
0035791053
-
Securing context-aware applications using environmental roles
-
M. J. Covington, W. Long, S. Srinivasan, A. K. Dev, M. Ahmad, and G. Abowd. Securing context-aware applications using environmental roles. In Proceedings of the 6th ACM symposium on Access Controls models and technologies, pages 10-20, 2001.
-
(2001)
Proceedings of the 6th ACM Symposium on Access Controls Models and Technologies
, pp. 10-20
-
-
Covington, M.J.1
Long, W.2
Srinivasan, S.3
Dev, A.K.4
Ahmad, M.5
Abowd, G.6
-
10
-
-
17544363632
-
Relation algebras over containers and surfaces: An ontological study of a room space
-
M. Egenhofer and A. Rodr?guez. Relation algebras over containers and surfaces: An ontological study of a room space. Spatial Cognition and Computation, 1(2):155-180, 1999.
-
(1999)
Spatial Cognition and Computation
, vol.1
, Issue.2
, pp. 155-180
-
-
Egenhofer, M.1
Rodrguez, A.2
-
11
-
-
84884382677
-
The mobadtl model and method to design network aware applications
-
University of Pisa
-
G. Ferrari, C. Montagnero, L. Semini, and S. Semprini. The mobadtl model and method to design network aware applications. Technical report, Computer Science Dept., University of Pisa, 2003.
-
(2003)
Technical Report Computer Science Dept.
-
-
Ferrari, G.1
Montagnero, C.2
Semini, L.3
Semprini, S.4
-
15
-
-
84884386456
-
-
IBM. Autonomic computing manifesto. WWW, October 2001
-
IBM. Autonomic computing manifesto. WWW, October 2001.
-
-
-
-
20
-
-
29244463432
-
Spatial security policies for mobile agents in a sentient computing environment
-
D. Scott, A. Beresford, and A. Mycroft. Spatial security policies for mobile agents in a sentient computing environment. In Proceedings of The FASE 2003, 2003.
-
(2003)
Proceedings of the FASE 2003
-
-
Scott, D.1
Beresford, A.2
Mycroft, A.3
-
21
-
-
0032679423
-
Spatial databases: Accomplishments and research needs
-
S. Shekhar, S. Chawla, S. Ravada, S. Fetterer, and C. Liu. Spatial databases: Accomplishments and research needs. IEEE Trans on Knowledge and Data Engineering, 11(1):45-55, 1999.
-
(1999)
IEEE Trans on Knowledge and Data Engineering
, vol.11
, Issue.1
, pp. 45-55
-
-
Shekhar, S.1
Chawla, S.2
Ravada, S.3
Fetterer, S.4
Liu, C.5
-
22
-
-
84864996824
-
One user, many hats; And, sometimes, no hat towards a secure yet usable pda
-
F. Stajano. One user, many hats; and, sometimes, no hat?towards a secure yet usable pda. In Proceedings of Security Protocols Workshop, 2004.
-
(2004)
Proceedings of Security Protocols Workshop
-
-
Stajano, F.1
-
25
-
-
0001853125
-
The computer for the 21st century
-
September
-
M. Weiser. The computer for the 21st century. Scienti -c American, 265(3):94-104, September 1991.
-
(1991)
Scientific American
, vol.265
, Issue.3
, pp. 94-104
-
-
Weiser, M.1
|