Sciweavers

3299 search results - page 171 / 660
» Privacy and Trusted Computing
Sort
View
CHI
2007
ACM
16 years 5 months ago
Over-exposed?: privacy patterns and considerations in online and mobile photo sharing
As sharing personal media online becomes easier and widely spread, new privacy concerns emerge ? especially when the persistent nature of the media and associated context reveals ...
Shane Ahern, Dean Eckles, Nathaniel Good, Simon Ki...
CHI
2003
ACM
16 years 5 months ago
Unpacking "privacy" for a networked world
Although privacy is broadly recognized as a dominant concern for the development of novel interactive technologies, our ability to reason analytically about privacy in real settin...
Leysia Palen, Paul Dourish
CIA
2007
Springer
15 years 11 months ago
A Probabilistic Framework for Decentralized Management of Trust and Quality
In this paper, we propose a probabilistic framework targeting three important issues in the computation of quality and trust in decentralized systems. Specifically, our approach a...
Le-Hung Vu, Karl Aberer
AINA
2007
IEEE
15 years 11 months ago
Mobile Agents and the Deus Ex Machina
This paper aims to examine the benefits the introduction of trusted computing can bring to the mobile agent paradigm, with a specific emphasis on mobile agent security.
Shane Balfe, Eimear Gallery
122
Voted
SEMCO
2007
IEEE
15 years 11 months ago
A Trust Based Methodology for Web Service Selection
In this paper, we propose a methodology for addressing trust in Semantic Web Services (SWS) based applications. The aim is to enhance the capability-driven selection provided by c...
Stefania Galizia, Alessio Gugliotta, John Domingue