Sciweavers

1402 search results - page 182 / 281
» Personalized privacy preservation
Sort
View
SIGCOMM
2012
ACM
13 years 3 months ago
Signposts: end-to-end networking in a world of middleboxes
This demo presents Signposts, a system to provide users with a secure, simple mechanism to establish and maintain communication channels between their personal cloud of named devi...
Amir Chaudhry, Anil Madhavapeddy, Charalampos Rots...
ICIP
2006
IEEE
16 years 2 months ago
Light Weight Background Blurring for Video Conferencing Applications
Background blurring is an effective way to both preserving privacy and keeping communication effective during video conferencing. This paper proposes a light weight real-time algo...
Cha Zhang, Yong Rui, Li-wei He
GIS
2008
ACM
16 years 1 months ago
A location aware role and attribute based access control system
In this paper, we follow the role-based access control (RBAC) approach and extend it to provide for the dynamic association of roles with users. In our framework, privileges assoc...
Isabel F. Cruz, Rigel Gjomemo, Benjamin Lin, Mirko...
87
Voted
WWW
2005
ACM
16 years 1 months ago
A language for expressing user-context preferences in the web
In this paper, we introduce WPML (WebProfiles Markup Language) for expressing user-context preferences information in the Web. Using WPML a service provider can negotiate and obta...
Diego López de Ipiña, Juan Ignacio V...
108
Voted
WMCSA
2008
IEEE
15 years 7 months ago
Location-based trust for mobile user-generated content: applications, challenges and implementations
The recent explosion in shared media content and sensed data produced by mobile end-users is challenging well-established principles and assumptions in data trust models. A fundam...
Vincent Lenders, Emmanouil Koukoumidis, Pei Zhang,...