نتایج جستجو برای: enhancing values

تعداد نتایج: 601335  

Journal: :J. UCS 2011
Wynand J. C. van Staden Martin S. Olivier

This paper puts forward a verification method for compound purposes and compound reasons to be used during purpose limitation. When it is absolutely necessary to collect privacy related information, it is essential that privacy enhancing technologies (PETs) protect access to data – in general accomplished by using the concept of purposes bound to data. Compound purposes and reasons are an enhan...

Journal: :RFC 2001
John Border Markku Kojo Jim Griner Gabriel Montenegro Zach Shelby

This document is a survey of Performance Enhancing Proxies (PEPs) often employed to improve degraded TCP performance caused by characteristics of specific link environments, for example, in satellite, wireless WAN, and wireless LAN environments. Different types of Performance Enhancing Proxies are described as well as the mechanisms used to improve performance. Emphasis is put on proxies operat...

2009
Igor Bisio Mario Marchese Maurizio Mongelli

There are many types of Performance Enhancing Proxies (PEPs). Different types of PEPs are used in different environments to overcome different link characteristics which affect protocol performance [1]. The main examples concerns satellite and wireless networks, which represent the most challenging environments. In the following, the main concepts representing the state of the art of the PEP wi...

Journal: :CoRR 2017
David Harborth Dominik Herrmann Stefan Köpsell Sebastian Pape Christian Roth Hannes Federrath Dogan Kesdogan Kai Rannenberg

The AN.ON-Next project aims to integrate privacy-enhancing technologies into the internet’s infrastructure and establish them in the consumer mass market. The technologies in focus include a basis protection at internet service provider level, an improved overlay network-based protection and a concept for privacy protection in the emerging 5G mobile network. A crucial success factor will be the...

2009
Jan Camenisch Gregory Neven

With the increasing use of electronic media for our daily transactions, we widely distribute our personal information. Once released, controlling the dispersal of these information is virtually impossible. Privacy-enhancing technologies can help to minimize the amount of information that needs to be revealed in transactions, on the one hand, and to limit the dispersal, on the other hand. Unfort...

Journal: :Business & Information Systems Engineering 2011
Noboru Sonehara Isao Echizen Sven Wohlgemuth

Sustainability of Cloud Computing is assured for the uncritical services only. There is basically no company that entrusts critical data to a Cloud. Cloud Computing does not realize its potentials as far a cost reduction in IT is concerned. The reason is the lack of isolation. Isolation can be seen as a special sort of privacy, where the a service should not get in contact with other services, ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید