Sciweavers

52 search results - page 1 / 11
» ACON: Activity-Centric Access Control for Social Computing
Sort
View
ARESEC
2011
110views more  ARESEC 2011»
12 years 4 months ago
ACON: Activity-Centric Access Control for Social Computing
—With increasing amount of sensitive user data stored in social computing systems (SCSs) and lack of consensus on how it should be protected under meaningful control by the avera...
Jaehong Park, Ravi S. Sandhu, Yuan Cheng
CHI
2008
ACM
14 years 5 months ago
Access control by testing for shared knowledge
Controlling the privacy of online content is difficult and often confusing. We present a social access control where users devise simple questions of shared knowledge instead of c...
Michael Toomim, Xianhang Zhang, James Fogarty, Jam...
MIDDLEWARE
2010
Springer
13 years 3 months ago
Prometheus: User-Controlled P2P Social Data Management for Socially-Aware Applications
Recent Internet applications, such as online social networks and user-generated content sharing, produce an unprecedented amount of social information, which is further augmented b...
Nicolas Kourtellis, Joshua Finnis, Paul Anderson, ...
HCI
2009
13 years 2 months ago
Impact on Performance and Process by a Social Annotation System: A Social Reading Experiment
Social annotation systems such as SparTag.us and del.icio.us have been designed to encourage individual reading and marking behaviors that, when shared, accumulate to build collect...
Les Nelson, Gregorio Convertino, Peter Pirolli, Li...
IEEEARES
2007
IEEE
13 years 11 months ago
Context-Dependent Access Control for Contextual Information
Abstract— Following Mark Weiser’s vision of ubiquitous computing and calm technology, computer systems should run in the background, preferably without the user noticing it at ...
Christin Groba, Stephan Grob, Thomas Springer