Sciweavers

1818 search results - page 223 / 364
» How users use access control
Sort
View
CCS
2008
ACM
15 years 6 months ago
Stale-safe security properties for group-based secure information sharing
Attribute staleness arises due to the physical distribution of authorization information, decision and enforcement points. This is a fundamental problem in virtually any secure di...
Ram Krishnan, Jianwei Niu, Ravi S. Sandhu, William...
ICDE
2008
IEEE
149views Database» more  ICDE 2008»
16 years 5 months ago
Sharoes: A Data Sharing Platform for Outsourced Enterprise Storage Environments
Abstract-- With fast paced growth of digital data and exploding storage management costs, enterprises are looking for new ways to effectively manage their data. One such cost-effec...
Aameek Singh, Ling Liu
IUI
1999
ACM
15 years 8 months ago
Opportunistic Exploration of Large Consumer Product Spaces
The advent of the Web has brought an unprecedented amount of information together with a large, diverse set of users. Online users are performing a wider variety of tasks than eve...
Doug Bryan, Anatole Gershman
IJCAI
2007
15 years 6 months ago
Privacy and Artificial Agents, or, Is Google Reading My Email?
We investigate legal and philosophical notions of privacy in the context of artificial agents. Our analysis utilizes a normative account of privacy that defends its value and the ...
Samir Chopra, Laurence White
EICS
2009
ACM
15 years 8 months ago
An infrastructure for experience centered agile prototyping of ambient intelligence
Ubiquitous computing poses new usability challenges that cut across design and development. We are particularly interested in "spaces" enhanced with sensors, public disp...
José Luís Silva, José Creissa...