Sciweavers

3299 search results - page 144 / 660
» Privacy and Trusted Computing
Sort
View
CCS
2006
ACM
15 years 8 months ago
Safety and consistency in policy-based authorization systems
In trust negotiation and other distributed proving systems, networked entities cooperate to form proofs that are justified by collections of certified attributes. These attributes...
Adam J. Lee, Marianne Winslett
ERSHOV
2006
Springer
15 years 8 months ago
A Formal Model of Data Privacy
Information systems support data privacy by constraining user's access to public views and thereby hiding the non-public underlying data. The privacy problem is to prove that ...
Phiniki Stouppa, Thomas Studer
CHI
2005
ACM
16 years 5 months ago
Privacy gradients: exploring ways to manage incidental information during co-located collaboration
This research introduces privacy issues related to the viewing of incidental information during co-located collaboration. Web browsers were the representative application used in ...
Kirstie Hawkey, Kori M. Inkpen
159
Voted
COMSNETS
2012
222views more  COMSNETS 2012»
14 years 19 days ago
Assessing the veracity of identity assertions via OSNs
Anonymity is one of the main virtues of the Internet, as it protects privacy and enables users to express opinions more freely. However, anonymity hinders the assessment of the ve...
Michael Sirivianos, Kyungbaek Kim, Jian Wei Gan, X...
CHI
2006
ACM
16 years 5 months ago
Reinventing trust, collaboration and compliance in social systems
The objective of this paper is to set the research agenda for a workshop focusing on novel approaches to supporting trust, collaboration, and compliance in social systems. Suggest...
Jens Riegelsberger, Asimina Vasalou, Philip Bonhar...