Information, its gathering, sharing, and storage, is growing at a very rapid rate. Information turned into knowledge leads to sensemaking. Ontologies, and their representations in ...
Tope Omitola, Ian Millard, Hugh Glaser, Nicholas G...
We believe this paper is the first extensive user-study of whitelisting email addresses. While whitelists are common in social networking and instant messaging (e.g., buddylists),...
Typical security models used for proving security of deployed cryptographic primitives do not allow adversaries to rewind or reset honest parties to an earlier state. Thus, it is c...
Current PKI-based email systems (such as X.509 S/MIME and PGP/ MIME) potentially enable a recipient to determine a name and organizational affiliation of the sender. This informati...
Existing technologies for file sharing differ widely in the granularity of control they give users over who can access their data; achieving finer-grained control generally requ...