Sciweavers

468 search results - page 62 / 94
» Interactivity for Reactive Access Control
Sort
View
COMPSEC
2010
93views more  COMPSEC 2010»
14 years 9 months ago
Roving bugnet: Distributed surveillance threat and mitigation
Abstract Advanced mobile devices such as laptops and smartphones make convenient hiding places for surveillance spyware. They commonly have a microphone and camera built-in, are in...
Ryan Farley, Xinyuan Wang
ICOODB
2010
171views Database» more  ICOODB 2010»
14 years 7 months ago
Data Model Driven Implementation of Web Cooperation Systems with Tricia
Abstract. We present the data modeling concepts of Tricia, an opensource Java platform used to implement enterprise web information systems as well as social software solutions inc...
Thomas Büchner, Florian Matthes, Christian Ne...
CSFW
2011
IEEE
13 years 9 months ago
Regret Minimizing Audits: A Learning-Theoretic Basis for Privacy Protection
Abstract—Audit mechanisms are essential for privacy protection in permissive access control regimes, such as in hospitals where denying legitimate access requests can adversely a...
Jeremiah Blocki, Nicolas Christin, Anupam Datta, A...
AAAI
1993
14 years 11 months ago
A Method for Development of Dialogue Managers for Natural Language Interfaces
This paper describes a method for the development of dialogue managers for natural language interfaces. A dialogue manager is presented designed on the basis of both a theoretical...
Arne Jönsson
EUC
2008
Springer
14 years 11 months ago
Analyzing Privacy Designs of Mobile Social Networking Applications
The combined advances of open mobile platforms and online social networking applications (SNAs) are driving pervasive computing to the real-world users, as the mobile SNAs are exp...
Guanling Chen, Faruq Rahman