Sciweavers

474 search results - page 64 / 95
» Privacy suites: shared privacy for social networks
Sort
View
CCS
2010
ACM
14 years 9 months ago
Developing security protocols by refinement
We propose a development method for security protocols based on stepwise refinement. Our refinement strategy guides sformation of abstract security goals into protocols that are s...
Christoph Sprenger, David A. Basin
CSCW
1996
ACM
15 years 4 months ago
TeamRooms: Network Places for Collaboration
Teams whose members are in close physical proximity often rely on team rooms to serve both as meeting places and repositories of the documents and artifacts that support their pro...
Mark Roseman, Saul Greenberg
PERCOM
2004
ACM
15 years 11 months ago
A Software Engineering Framework for Context-Aware Pervasive Computing
There is growing interest in the use of context-awareness as a technique for developing pervasive computing applications that are flexible, adaptable, and capable of acting autono...
Karen Henricksen, Jadwiga Indulska
CHI
2007
ACM
16 years 6 days ago
Give and take: a study of consumer photo-sharing culture and practice
In this paper, we present initial findings from the study of a digital photo-sharing website: Flickr.com. In particular, we argue that Flickr.com appears to support--for some peop...
Andrew D. Miller, W. Keith Edwards
SP
2008
IEEE
103views Security Privacy» more  SP 2008»
15 years 6 months ago
Preserving Caller Anonymity in Voice-over-IP Networks
— Applications such as VoIP need to provide anonymity to clients while maintaining low latency to satisfy quality of service (QoS) requirements. Existing solutions for providing ...
Mudhakar Srivatsa, Ling Liu, Arun Iyengar