Sciweavers

75 search results - page 15 / 15
» Semantic context aware security policy deployment
Sort
View
SOUPS
2009
ACM
13 years 11 months ago
Who's viewed you?: the impact of feedback in a mobile location-sharing application
Feedback is viewed as an essential element of ubiquitous computing systems in the HCI literature for helping people manage their privacy. However, the success of online social net...
Janice Y. Tsai, Patrick Gage Kelley, Paul Hankes D...
FC
2010
Springer
181views Cryptology» more  FC 2010»
13 years 9 months ago
Design and Implementation of a Key-Lifecycle Management System
Key management is the Achilles’ heel of cryptography. This work presents a novel Key-Lifecycle Management System (KLMS), which addresses two issues that have not been addressed ...
Mathias Björkqvist, Christian Cachin, Robert ...
WWW
2004
ACM
14 years 6 months ago
Dynamic assembly of learning objects
This paper describes one solution to the problem of how to select sequence, and link Web resources into a coherent, focused organization for instruction that addresses a user'...
Robert G. Farrell, Soyini D. Liburd, John C. Thoma...
COMPUTER
2002
196views more  COMPUTER 2002»
13 years 5 months ago
Grid Services for Distributed System Integration
ions and concepts that let applications access and share resources and services across distributed, wide area networks, while providing common security semantics, distributed resou...
Ian T. Foster, Carl Kesselman, Jeffrey M. Nick, St...
GEOS
2007
Springer
13 years 11 months ago
Spatio-temporal Conceptual Schema Development for Wide-Area Sensor Networks
Abstract. A Wide-Area Sensor Network (WASN) is a collection of heterogeneous sensor networks and data repositories spread over a wide geographic area. The diversity of sensor types...
Mallikarjun Shankar, Alexandre Sorokine, Budhendra...