Sciweavers

2454 search results - page 353 / 491
» Privacy in the Information and Communications Technologies
Sort
View
IEEECIT
2010
IEEE
14 years 8 months ago
Efficient Sharing of Secure Cloud Storage Services
Suppose Bob, the boss in Company A, pays a secure cloud storage service and authorizes all the employees in that company to share such a service. There exists a user hierarchy: Bob...
Qin Liu, Guojun Wang, Jie Wu
APWEB
2011
Springer
14 years 1 months ago
SecGuard: Secure and Practical Integrity Protection Model for Operating Systems
Host compromise is a serious security problem for operating systems. Most previous solutions based on integrity protection models are difficult to use; on the other hand, usable i...
Ennan Zhai, Qingni Shen, Yonggang Wang, Tao Yang, ...
MMS
2012
13 years 14 days ago
Privacy-sensitive recognition of group conversational context with sociometers
Recognizing the conversational context in which group interactions unfold has applications in machines that support collaborative work and perform automatic social inference using ...
Dinesh Babu Jayagopi, Taemie Kim, Alex Pentland, D...
85
Voted
CHI
2008
ACM
15 years 10 months ago
The network in the garden: an empirical analysis of social media in rural life
History repeatedly demonstrates that rural communities have unique technological needs. Yet, we know little about how rural communities use modern technologies, so we lack knowled...
Eric Gilbert, Karrie Karahalios, Christian Sandvig
ISW
2007
Springer
15 years 4 months ago
Enabling Fairer Digital Rights Management with Trusted Computing
Abstract. Today, digital content is routinely distributed over the Internet, and consumed in devices based on open platforms. However, on open platforms users can run exploits, rec...
Ahmad-Reza Sadeghi, Marko Wolf, Christian Stü...