Sciweavers

436 search results - page 18 / 88
» Arguing for gaining access to information
Sort
View
AMTA
2004
Springer
15 years 5 months ago
A Structurally Diverse Minimal Corpus for Eliciting Structural Mappings Between Languages
Abstract. We describe an approach to creating a small but diverse corpus in English that can be used to elicit information about any target language. The focus of the corpus is on ...
Katharina Probst, Alon Lavie
PST
2004
15 years 1 months ago
The Sensitivities of User Profile Information in Music Recommender Systems
Personalized services can cause privacy concerns, due to the acquisition, storage and application of sensitive personal information. This paper describes empirical research into th...
Evelien van de Garde-Perik, Boris E. R. de Ruyter,...
IJMMS
2007
103views more  IJMMS 2007»
14 years 11 months ago
Improving password security and memorability to protect personal and organizational information
Personal information and organizational information need to be protected, which requires that only authorized users gain access to the information. The most commonly used method f...
Kim-Phuong L. Vu, Robert W. Proctor, Abhilasha Bha...
SIGCOMM
2009
ACM
15 years 6 months ago
Resonance: dynamic access control for enterprise networks
Enterprise network security is typically reactive, and it relies heavily on host security and middleboxes. This approach creates complicated interactions between protocols and sys...
Ankur Kumar Nayak, Alex Reimers, Nick Feamster, Ru...
CCS
2007
ACM
15 years 6 months ago
A simple and expressive semantic framework for policy composition in access control
In defining large, complex access control policies, one would like to compose sub-policies, perhaps authored by different organizations, into a single global policy. Existing po...
Glenn Bruns, Daniel S. Dantas, Michael Huth