Sciweavers

1818 search results - page 224 / 364
» How users use access control
Sort
View
SOUPS
2010
ACM
15 years 4 months ago
The impact of social navigation on privacy policy configuration
Social navigation is a promising approach to help users make better privacy and security decisions using community knowledge and expertise. Social navigation has recently been app...
Andrew Besmer, Jason Watson, Heather Richter Lipfo...
JSAC
2011
137views more  JSAC 2011»
14 years 11 months ago
Cognitive Network Interference
—Opportunistic spectrum access creates the opening of under-utilized portions of the licensed spectrum for reuse, provided that the transmissions of secondary radios do not cause...
Alberto Rabbachin, Tony Q. S. Quek, Hyundong Shin,...
PODC
2011
ACM
14 years 7 months ago
Securing social networks
We present a cryptographic framework to achieve access control, privacy of social relations, secrecy of resources, and anonymity of users in social networks. The main idea is to u...
Michael Backes, Matteo Maffei, Kim Pecina
AIMS
2010
Springer
15 years 9 months ago
Scalable Service Performance Monitoring
Abstract. Dependable performance measurement is a common requirement for all on-line services. The ongoing tendency to outsource not only infrastructure, but also software parts to...
Idilio Drago, Aiko Pras
ERCIMDL
2010
Springer
141views Education» more  ERCIMDL 2010»
15 years 4 months ago
DINAH, A Philological Platform for the Construction of Multi-structured Documents
Abstract. We consider how the construction of multi-structured documents implies the definition of structuration vocabularies. In a multiusers context, the growth of these vocabula...
Pierre-Edouard Portier, Sylvie Calabretto