Sciweavers

3000 search results - page 18 / 600
» Accessing an Information System by Chatting
Sort
View
106
Voted
DISCEX
2003
IEEE
15 years 7 months ago
Achieving Principled Assuredly Trustworthy Composable Systems and Networks
Huge challenges exist with systems and networks that must dependably satisfy stringent requirements for security, reliability, and other attributes of trustworthiness. Drawing on ...
Peter G. Neumann
109
Voted
COOPIS
2003
IEEE
15 years 7 months ago
Providing a Progressive Access to Awareness Information
Awareness has now become a widely accepted central feature in groupware systems. In this context, providing an awareness support consists in delivering to users involved in a colla...
Manuele Kirsch-Pinheiro, Marlène Villanova-...
IEEEARES
2007
IEEE
15 years 8 months ago
Context-Dependent Access Control for Contextual Information
Abstract— Following Mark Weiser’s vision of ubiquitous computing and calm technology, computer systems should run in the background, preferably without the user noticing it at ...
Christin Groba, Stephan Grob, Thomas Springer
SACMAT
2004
ACM
15 years 7 months ago
Implementing access control to people location information
Ubiquitous computing uses a variety of information for which access needs to be controlled. For instance, a person’s current location is a sensitive piece of information, which ...
Urs Hengartner, Peter Steenkiste
97
Voted
CIKM
1995
Springer
15 years 5 months ago
Learning Subjective Relevance to Facilitate Information Access
As the amount of available electronic information is dramatically increasing, the ability for rapid and e ective access to information has become critical. Most traditional inform...
James R. Chen, Nathalie Mathe