Sciweavers

490 search results - page 26 / 98
» Enabling User Control with Personal Identity Management
Sort
View
101
Voted
COLCOM
2007
IEEE
15 years 6 months ago
Towards trust-aware access management for ad-hoc collaborations
—In an ad-hoc collaborative sharing environment, attribute-based access control provides a promising approach in defining authorization over shared resources based on users’ p...
Jing Jin, Gail-Joon Ahn, Mohamed Shehab, Hongxin H...
CN
2006
65views more  CN 2006»
15 years 15 days ago
Modeling web applications reacting to user behaviors
Many current research efforts address the problem of personalizing the Web experience for each user with respect to user's identity and/or context. In this paper we propose a...
Stefano Ceri, Florian Daniel, Federico Michele Fac...
ICDE
2006
IEEE
156views Database» more  ICDE 2006»
16 years 1 months ago
UNIT: User-centric Transaction Management in Web-Database Systems
Web-database systems are nowadays an integral part of everybody's life, with applications ranging from monitoring/trading stock portfolios, to personalized blog aggregation a...
Alexandros Labrinidis, Daniel Mossé, Huimin...
DIM
2005
ACM
15 years 2 months ago
Pseudonym management using mediated identity-based cryptography
Mobile Location-Based Services (LBS) have raised privacy concerns amongst mobile phone users who may need to supply their identity and location information to untrustworthy third ...
Thibault Candebat, Cameron Ross Dunne, David T. Gr...
ECCV
2010
Springer
15 years 5 months ago
Being John Malkovich
Given a photo of person A, we seek a photo of person B with similar pose and expression. Solving this problem enables a form of puppetry, in which one person appears to control the...
Ira Kemelmacher-Shlizerman, Aditya Sankar, Eli She...