Sciweavers

599 search results - page 49 / 120
» Managing Privacy in LBAC Systems
Sort
View
ICONFERENCE
2011
14 years 6 months ago
Beyond promotion and protection: creators, audiences and common ground in user-generated media
In this paper, we present findings from a qualitative study of producers in a specific creative domain—online digital photography. We used social psychology and linguistic conce...
Eric C. Cook, Stephanie D. Teasley
STORAGESS
2006
ACM
15 years 5 months ago
Secure deletion myths, issues, and solutions
This paper has three goals. (1) We try to debunk several held misconceptions about secure deletion: that encryption is an ideal solution for everybody, that existing data-overwrit...
Nikolai Joukov, Harry Papaxenopoulos, Erez Zadok
DIM
2005
ACM
15 years 1 months ago
A delegation framework for federated identity management
Identity federation is a powerful scheme that links accounts of users maintained distinctly by different business partners. The concept of network identity is a driver for accele...
Hidehito Gomi, Makoto Hatakeyama, Shigeru Hosono, ...
OOPSLA
2005
Springer
15 years 5 months ago
Using dependency models to manage complex software architecture
An approach to managing the architecture of large software systems is presented. Dependencies are extracted from the code by a conventional static analysis, and shown in a tabular...
Neeraj Sangal, Ev Jordan, Vineet Sinha, Daniel Jac...
ACSW
2006
15 years 1 months ago
Improving resource utilisation in market oriented grid management and scheduling
Service providers of the future could dynamically negotiate for, and create their infrastructure on Grid based utility computing and communication providers. Such commercialisatio...
Kris Bubendorfer