Sciweavers

70 search results - page 11 / 14
» Enhancing privacy management support in instant messaging
Sort
View
IDTRUST
2009
ACM
15 years 4 months ago
Usable secure mailing lists with untrusted servers
Mailing lists are a natural technology for supporting messaging in multi-party, cross-domain collaborative tasks. However, whenever sensitive information is exchanged on such list...
Rakeshbabu Bobba, Joe Muggli, Meenal Pant, Jim Bas...
DIM
2005
ACM
14 years 11 months ago
Establishing and protecting digital identity in federation systems
We develop solutions for the security and privacy of user identity information in a federation. By federation we mean a group of organizations or service providers which have buil...
Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciari...
MDM
2007
Springer
125views Communications» more  MDM 2007»
15 years 3 months ago
Extending P3P/Appel for Friend Finder
FriendFinder as a location-based service collects location data from mobile users and distributes a particular user’s location upon request. Privacy of users data especially loc...
Emin Islam Tatli
75
Voted
CCS
2009
ACM
15 years 4 months ago
A practical property-based bootstrap architecture
Binary attestation, as proposed by the Trusted Computing Group (TCG), is a pragmatic approach for software integrity protection and verification. However, it has also various sho...
René Korthaus, Ahmad-Reza Sadeghi, Christia...
EJIS
2010
112views more  EJIS 2010»
14 years 9 months ago
Toward an 'IT Conflict-Resistance Theory': action research during IT pre-implementation
Most empirical research on users' resistance toward Information Technology (IT) has been conducted after implementation of IT in organisations. Little research has been done ...
Regis Meissonier, Emmanuel Houzé