Sciweavers

13417 search results - page 71 / 2684
» Personal information management
Sort
View
ACSAC
2000
IEEE
15 years 4 months ago
Usability Meets Security -The Identity-Manager as Your Personal Security Assistant for the Internet
In today’s applications, most users disregard the security functionality. They do not have the knowledge and/or the motivation to configure or to use the existing security func...
Uwe Jendricke, Daniela Gerd tom Markotten
DMSN
2004
ACM
15 years 3 months ago
Confidence-based data management for personal area sensor networks
The military is working on embedding sensors in a "smart uniform" that will monitor key biological parameters to determine the physiological status of a soldier. The sol...
Nesime Tatbul, Mark Buller, Reed Hoyt, Steve Mulle...
SIGMOD
2008
ACM
198views Database» more  SIGMOD 2008»
15 years 12 months ago
Efficient storage scheme and query processing for supply chain management using RFID
As the size of an RFID tag becomes smaller and the price of the tag gets lower, RFID technology has been applied to a wide range of areas. Recently, RFID has been adopted in the b...
Chun-Hee Lee, Chin-Wan Chung
SOUPS
2009
ACM
15 years 6 months ago
Challenges in supporting end-user privacy and security management with social navigation
Social navigation is a promising approach for supporting privacy and security management. By aggregating and presenting the choices made by others, social navigation systems can p...
Jeremy Goecks, W. Keith Edwards, Elizabeth D. Myna...
VEE
2010
ACM
291views Virtualization» more  VEE 2010»
15 years 6 months ago
Neon: system support for derived data management
Modern organizations face increasingly complex information management requirements. A combination of commercial needs, legal liability and regulatory imperatives has created a pat...
Qing Zhang, John McCullough, Justin Ma, Nabil Sche...