Sciweavers

490 search results - page 13 / 98
» Enabling User Control with Personal Identity Management
Sort
View
128
Voted
CNSM
2010
14 years 4 months ago
Towards non-expert users monitoring networks and services through semantically enhanced visualizations
— Managing networks and services in large virtual enterprises often requires significant expertise to decipher and reconcile information coming from several heterogeneous sources...
Owen Conlan, John Keeney, Cormac Hampson, Fion&aac...
78
Voted
SACMAT
2010
ACM
15 years 5 months ago
A card requirements language enabling privacy-preserving access control
We address the problem of privacy-preserving access control in distributed systems. Users commonly reveal more personal data than strictly necessary to be granted access to online...
Jan Camenisch, Sebastian Mödersheim, Gregory ...
88
Voted
OZCHI
2005
ACM
15 years 6 months ago
Personalisation in intelligent environments: managing the information flow
This paper describes research into the personalised delivery of information about an intelligent environment. The challenges we need to address are the dual forms of the Invisibili...
Craig Chatfield, David J. Carmichael, René ...
96
Voted
CHI
2004
ACM
16 years 23 days ago
Personal information management
The explosion of the amount of information available in digital form has made search a hot research topic for the Information Management Community. While most of the research on s...
Ofer Bergman, Richard P. Boardman, Jacek Gwizdka, ...
91
Voted
NSPW
2003
ACM
15 years 5 months ago
Owner-controlled information
Large-scale data breaches exposing sensitive personal information are becoming commonplace. For numerous reasons, conventional personal (identification) information leaks from da...
Carrie Gates, Jacob Slonim