Sciweavers

2454 search results - page 460 / 491
» Privacy in the Information and Communications Technologies
Sort
View
MMS
2007
15 years 23 days ago
Modeling user context with applications to media retrieval
In this paper, we develop a theoretical understanding of multi-sensory knowledge and user context and their interrelationships. This is used to develop a generic representation fr...
Ankur Mani, Hari Sundaram
SACMAT
2010
ACM
14 years 11 months ago
Enforcing spatial constraints for mobile RBAC systems
Proposed models for spatially-aware extensions of role-based access control (RBAC) combine the administrative and security advantages of RBAC with the dynamic nature of mobile and...
Michael S. Kirkpatrick, Elisa Bertino
DAC
2009
ACM
14 years 11 months ago
A physical unclonable function defined using power distribution system equivalent resistance variations
For hardware security applications, the availability of secret keys is a critical component for secure activation, IC authentication and for other important applications including...
Ryan Helinski, Dhruva Acharyya, Jim Plusquellic
AISS
2010
119views more  AISS 2010»
14 years 10 months ago
Distributed Cipher Services Using Object Activation
As the World Wide Web grows rapidly on a daily basis, the number of new computer attacks is also growing at a matching rate. It is increasing by development of information and com...
JinKyoung Heo
IJIEM
2010
126views more  IJIEM 2010»
14 years 10 months ago
E-Health readiness framework from Electronic Health Records perspective
E-Health systems include applications of information communication technologies to promote healthcare services support, delivery and education. The success of an E-Health system i...
JunHua Li, Lesley Pek Wee Land, Pradeep Ray, Subha...