Sciweavers

490 search results - page 69 / 98
» Enabling User Control with Personal Identity Management
Sort
View
CHI
2005
ACM
16 years 26 days ago
Using intimacy, chronology and zooming to visualize rhythms in email experience
Experiences of intimacy and connectedness through social networks are vital to human sense of well-being. We live in an electronic habitat. Electronic mail functions as a medium o...
Mirko Mandic, Andruid Kerne
104
Voted
EDBT
2010
ACM
237views Database» more  EDBT 2010»
15 years 7 months ago
BronzeGate: real-time transactional data obfuscation for GoldenGate
Data privacy laws have appeared recently, such as the HIPAA laws for protecting medical records, and the PCI guidelines for protecting Credit Card information. Data privacy can be...
Shenoda Guirguis, Alok Pareek
113
Voted
CCS
2010
ACM
15 years 4 months ago
Data protection in outsourcing scenarios: issues and directions
Data outsourcing is an emerging paradigm that allows users and companies to give their (potentially sensitive) data to external servers that then become responsible for their stor...
Pierangela Samarati, Sabrina De Capitani di Vimerc...
121
Voted
HPDC
2005
IEEE
15 years 6 months ago
Supporting application-tailored grid file system sessions with WSRF-based services
This paper presents novel service-based Grid data management middleware that leverages standards defined by WSRF specifications to create and manage dynamic Grid file system sessi...
Ming Zhao 0002, Vineet Chadha, Renato J. O. Figuei...
ICDCSW
2008
IEEE
15 years 7 months ago
Towards Cyber-Physical Holodeck Systems Via Physically Rendered Environments (PRE's)
We present an early vision of a cyber-physical environment in which computer controlled rendering of physical surfaces, terrains, and environments is achieved by manipulating grid...
Veljko Krunic, Richard Han