Sciweavers

1818 search results - page 179 / 364
» How users use access control
Sort
View
119
Voted
TCC
2009
Springer
114views Cryptology» more  TCC 2009»
16 years 5 months ago
Predicate Privacy in Encryption Systems
Predicate encryption is a new encryption paradigm which gives a master secret key owner fine-grained control over access to encrypted data. The master secret key owner can generat...
Emily Shen, Elaine Shi, Brent Waters
134
Voted
MIDDLEWARE
2004
Springer
15 years 10 months ago
GridBox: securing hosts from malicious and greedy applications
Security is an important concern in providing the infrastructure for the implementation of general purpose computational grids. However, most grid implementations focus their secu...
Evgueni Dodonov, Joelle Quaini Sousa, Hélio...
JTAER
2008
82views more  JTAER 2008»
15 years 4 months ago
The Use of Digital Watermarking for Intelligence Multimedia Document Distribution
Digital watermarking is a promising technology to embed information as unperceivable signals in digital contents. Various watermarking techniques have been proposed to protect cop...
Shing-Chi Cheung, Dickson K. W. Chiu, Cedric Ho
CSCW
2010
ACM
16 years 1 months ago
Catchup: a useful application of time-travel in meetings
People are often required to catch up on information they have missed in meetings, because of lateness or scheduling conflicts. Catching up is a complex cognitive process where pe...
Simon Tucker, Ofer Bergman, Anand Ramamoorthy, Ste...
KDD
2004
ACM
187views Data Mining» more  KDD 2004»
16 years 5 months ago
Mission-Based Navigational Behaviour Modeling for Web Recommender Systems
Web recommender systems anticipate the information needs of on-line users and provide them with recommendations to facilitate and personalize their navigation. There are many appro...
Osmar R. Zaïane, Jia Li, Robert Hayward