Sciweavers

201 search results - page 21 / 41
» A Utility-Theoretic Approach to Privacy and Personalization
Sort
View
95
Voted
IEEEARES
2007
IEEE
15 years 6 months ago
Context-Dependent Access Control for Contextual Information
Abstract— Following Mark Weiser’s vision of ubiquitous computing and calm technology, computer systems should run in the background, preferably without the user noticing it at ...
Christin Groba, Stephan Grob, Thomas Springer
SOCIALCOM
2010
14 years 9 months ago
Securing Shareable Life-logs
Sharing life-log information in a social community has many advantages, both for the user and society. But sharing any type of personal information is a threat to privacy. In parti...
Reza Rawassizadeh, A Min Tjoa
CSREASAM
2010
14 years 9 months ago
Keyloggers in Cybersecurity Education
Abstract-- Keylogger programs attempt to retrieve confidential information by covertly capturing user input via keystroke monitoring and then relaying this information to others, o...
Christopher Wood, Rajendra Raj
100
Voted
AGENTS
1997
Springer
15 years 3 months ago
A Methodology for Building Believable Social Agents
Believable agents are defined to be interactive versions of quality characters in traditional artistic media like film. Such agents are useful in applications such as interactive ...
W. Scott Neal Reilly
ESORICS
2005
Springer
15 years 5 months ago
Minimal Disclosure in Hierarchical Hippocratic Databases with Delegation
Abstract. Hippocratic Databases have been proposed as a mechanism to guarantee the respect of privacy principles in data management. We argue that three major principles are missin...
Fabio Massacci, John Mylopoulos, Nicola Zannone