Sciweavers

133 search results - page 4 / 27
» Constraint-Sensitive Privacy Management for Personalized Web...
Sort
View
AGENTS
1998
Springer
15 years 1 months ago
Personal Security Agent: KQML-Based PKI
Certificate management infrastructure, a.k.a. PKI (Public Key Infrastructure), which issues and provides access to public key certificates to preserve the integrity of a public ke...
Qi He, Katia P. Sycara, Timothy W. Finin
85
Voted
CCS
2008
ACM
14 years 11 months ago
Cognitive security for personal devices
Humans should be able to think of computers as extensions of their body, as craftsmen do with their tools. Current security models, however, are too unlike those used in human min...
Rachel Greenstadt, Jacob Beal
71
Voted
ETRICS
2006
15 years 1 months ago
Policy-Based Integration of User and Provider-Sided Identity Management
Abstract. Depending on whether the users or the providers are performing it, Identity Management (IM) traditionally has different meanings. For users, IM means to choose between on...
Wolfgang Hommel
CN
2010
149views more  CN 2010»
14 years 9 months ago
An automatic HTTP cookie management system
HTTP cookies have been widely used for maintaining session states, personalizing, authenticating, and tracking user behaviors. Despite their importance and usefulness, cookies hav...
Chuan Yue, Mengjun Xie, Haining Wang
AGENTLINK
2003
Springer
246views ECommerce» more  AGENTLINK 2003»
15 years 2 months ago
User Profiling with Privacy: A Framework for Adaptive Information Agents
This paper presents a framework for personal agents that respect the privacy of the individual. We present some motivations and outline a framework for the use of personal agents a...
Ian Dickinson, Dave Reynolds, Dave Banks, Steve Ca...