Sciweavers

1305 search results - page 215 / 261
» Inferring Privacy Information from Social Networks
Sort
View
CSFW
2008
IEEE
15 years 8 months ago
Security Decision-Making among Interdependent Organizations
In various settings, such as when customers use the same passwords at several independent web sites, security decisions by one organization may have a significant impact on the s...
Reiko Ann Miura-Ko, Benjamin Yolken, John Mitchell...
CSFW
2006
IEEE
15 years 8 months ago
A Framework for Establishing Decentralized Secure Coalitions
A coalition provides a virtual space across a network that allows its members to interact in a transparent manner. Coalitions may be formed for a variety of purposes. These range ...
Hongbin Zhou, Simon N. Foley
CCS
2009
ACM
16 years 2 months ago
D-algebra for composing access control policy decisions
This paper proposes a D-algebra to compose decisions from multiple access control policies. Compared to other algebrabased approaches aimed at policy composition, D-algebra is the...
Qun Ni, Elisa Bertino, Jorge Lobo
CRYPTO
2006
Springer
159views Cryptology» more  CRYPTO 2006»
15 years 5 months ago
Asymptotically Optimal Two-Round Perfectly Secure Message Transmission
Abstract. The problem of perfectly secure message transmission concerns two synchronized non-faulty processors sender (S) and receiver (R) that are connected by a synchronous netwo...
Saurabh Agarwal, Ronald Cramer, Robbert de Haan
CHI
2010
ACM
15 years 8 months ago
Designing a technological playground: a field study of the emergence of play in household messaging
We present findings from a field study of Wayve, a situated messaging device for the home that incorporates handwriting and photography. Wayve was used by 24 households (some of w...
Siân E. Lindley, Richard H. R. Harper, Abiga...