Sciweavers

24529 search results - page 4649 / 4906
» Computing on Authenticated Data
Sort
View
SAC
2005
ACM
15 years 9 months ago
A case study of separation of duty properties in the context of the Austrian "eLaw" process
Over the last few years rapid progress has been made in moving from conceptual studies, “whitepapers” and initiatives to the actual deployment of e-Government systems [13]. In...
Andreas Schaad, Pascal Spadone, Helmut Weichsel
SIGUCCS
2005
ACM
15 years 9 months ago
A case study: implementing novell identity management at Drew University
Starting in 2003, Drew University began a process to replace its manual account management procedures with an automated provisioning system based upon Novell technologies. Over th...
E. Axel Larsson
SOUPS
2005
ACM
15 years 9 months ago
Developing privacy guidelines for social location disclosure applications and services
In this article, we describe the design process of Reno, a location-enhanced, mobile coordination tool and person finder. The design process included three field experiments: a ...
Giovanni Iachello, Ian E. Smith, Sunny Consolvo, M...
VRST
2005
ACM
15 years 9 months ago
A 2D-3D integrated environment for cooperative work
This paper proposes a novel tabletop display system for natural communication and flexible information sharing. The proposed system is specifically designed for integration of 2...
Kousuke Nakashima, Takashi Machida, Kiyoshi Kiyoka...
CCS
2005
ACM
15 years 9 months ago
Obfuscated databases and group privacy
We investigate whether it is possible to encrypt a database and then give it away in such a form that users can still access it, but only in a restricted way. In contrast to conve...
Arvind Narayanan, Vitaly Shmatikov
« Prev « First page 4649 / 4906 Last » Next »