Sciweavers

445 search results - page 74 / 89
» Authorization and Access Control in IRO-DB
Sort
View
ICMCS
2007
IEEE
128views Multimedia» more  ICMCS 2007»
15 years 3 months ago
Interactive Search of Adipocytes in Large Collections of Digital Cellular Images
In the field of lipid research, the measurement of adipocyte size is an important but difficult problem. We describe an imaging-based solution that combines precise investigator...
Adam Goode, Mei Chen, Anil Tarachandani, Lily B. M...
COLCOM
2009
IEEE
15 years 2 months ago
Towards automatic privacy management in Web 2.0 with semantic analysis on annotations
— Sharing personal information and documents is pervasive in Web 2.0 environments, which creates the need for properly controlling shared data. Most existing authorization and po...
Nitya Vyas, Anna Cinzia Squicciarini, Chih-Cheng C...
EUC
2008
Springer
14 years 11 months ago
Privacy Engine for Context-Aware Enterprise Application Services
Satisfying the varied privacy preferences of individuals, while exposing context data to authorized applications and individuals, remains a major challenge for context-aware compu...
Marion Blount, John Davis, Maria Ebling, William F...
JCDL
2009
ACM
133views Education» more  JCDL 2009»
15 years 4 months ago
EnTag: enhancing social tagging for discovery
The EnTag (Enhanced Tagging for Discovery) project investigated the effect on indexing and retrieval when using only social tagging versus when using social tagging in combination...
Koraljka Golub, Jim Moon, Douglas Tudhope, Catheri...
SACMAT
2009
ACM
15 years 4 months ago
Foundations for group-centric secure information sharing models
We develop the foundations for a theory of Group-Centric Secure Information Sharing (g-SIS), characterize a specific family of models in this arena and identify several direction...
Ram Krishnan, Ravi S. Sandhu, Jianwei Niu, William...