Sciweavers

3544 search results - page 623 / 709
» Information Security in Open Systems
Sort
View
WWW
2010
ACM
15 years 6 months ago
Privacy wizards for social networking sites
Privacy is an enormous problem in online social networking sites. While sites such as Facebook allow users fine-grained control over who can see their profiles, it is difficult ...
Lujun Fang, Kristen LeFevre
OOPSLA
2010
Springer
14 years 9 months ago
Managing ambiguity in programming by finding unambiguous examples
We propose a new way to raise the level of discourse in the programming process: permit ambiguity, but manage it by linking it to unambiguous examples. This allows programming env...
Kenneth C. Arnold, Henry Lieberman
WWW
2009
ACM
15 years 11 months ago
A trust management framework for service-oriented environments
Many reputation management systems have been developed under the assumption that each entity in the system will use a variant of the same scoring function. Much of the previous wo...
William Conner, Arun Iyengar, Thomas A. Mikalsen, ...
ISW
2004
Springer
15 years 4 months ago
Low-Level Ideal Signatures and General Integrity Idealization
Abstract. Recently we showed how to justify a Dolev-Yao type model of cryptography as used in virtually all automated protocol provers under active attacks and in arbitrary protoco...
Michael Backes, Birgit Pfitzmann, Michael Waidner
91
Voted
AGENTS
2001
Springer
15 years 3 months ago
AgentSalon: facilitating face-to-face knowledge exchange through conversations among personal agents
This paper presents a system called AgentSalon, which facilitates face-to-face knowledge exchange and discussion by people having shared interests, in museums, schools, offices, a...
Yasuyuki Sumi, Kenji Mase