Sciweavers

599 search results - page 78 / 120
» Managing Privacy in LBAC Systems
Sort
View
CSCW
2011
ACM
14 years 8 months ago
Faceted identity, faceted lives: social and technical issues with being yourself online
This paper explores key issues people experience managing personal boundaries within and across social technologies. We look in particular at email and online social networks. We ...
Shelly Farnham, Elizabeth F. Churchill
ER
2004
Springer
103views Database» more  ER 2004»
15 years 7 months ago
WebDG - A Platform for E-Government Web Services
Abstract. Web services are deemed as the natural choice for deploying e-government applications. Their use enables e-government to fully get advantage of the envisioned Semantic We...
Athman Bouguettaya, Brahim Medjahed, Abdelmounaam ...
IEEEARES
2007
IEEE
15 years 7 months ago
Context-Dependent Access Control for Contextual Information
Abstract— Following Mark Weiser’s vision of ubiquitous computing and calm technology, computer systems should run in the background, preferably without the user noticing it at ...
Christin Groba, Stephan Grob, Thomas Springer
ACSAC
2010
IEEE
14 years 10 months ago
Heap Taichi: exploiting memory allocation granularity in heap-spraying attacks
Heap spraying is an attack technique commonly used in hijacking browsers to download and execute malicious code. In this attack, attackers first fill a large portion of the victim...
Yu Ding, Tao Wei, Tielei Wang, Zhenkai Liang, Wei ...
ACSAC
2007
IEEE
15 years 5 months ago
Distributed Secure Systems: Then and Now
The early 1980s saw the development of some rather sophisticated distributed systems. These were not merely networked file systems: rather, using remote procedure calls, hierarchi...
Brian Randell, John M. Rushby