Sciweavers

490 search results - page 9 / 98
» Enabling User Control with Personal Identity Management
Sort
View
PERCOM
2009
ACM
16 years 28 days ago
RationalExposure: a Game Theoretic Approach to Optimize Identity Exposure in Pervasive Computing Environments
In pervasive computing environments, personal information is expressed in digital forms to a great extent. Daily activities and personal preferences may be easily associated with p...
Feng Zhu, Wei Zhu
SIGCOMM
2009
ACM
15 years 7 months ago
Delegating network security with more information
Network security is gravitating towards more centralized control. Strong centralization places a heavy burden on the administrator who has to manage complex security policies and ...
Jad Naous, Ryan Stutsman, David Mazières, N...
129
Voted
HICSS
2003
IEEE
186views Biometrics» more  HICSS 2003»
15 years 5 months ago
Personalization through Mask Marketing
Customized marketing, so called 1-to-1 marketing, is often viewed as the panacea of e-commerce. User profiles, such as click streams logging every site the user accesses, are expl...
Moritz Strasser, Alf Zugenmaier
ICIS
2004
15 years 1 months ago
Alleviating Consumers' Privacy Concerns in Location-Based Services: A Psychological Control Perspective
Location-based services (LBS), enabled by advances in mobile and positioning technologies, have afforded users with a pervasive flexibility to be uniquely addressable and to acces...
Heng Xu, Hock-Hai Teo
100
Voted
INTETAIN
2005
Springer
15 years 5 months ago
Telepresence Techniques for Controlling Avatar Motion in First Person Games
First person games are computer games, in which the user experiences the virtual game world from an avatar’s view. This avatar is the user’s alter ego in the game. In this pape...
Henning Groenda, Fabian Nowak, Patrick Rö&szl...