Sciweavers

474 search results - page 69 / 95
» Privacy suites: shared privacy for social networks
Sort
View
COMSNETS
2012
222views more  COMSNETS 2012»
13 years 7 months ago
Assessing the veracity of identity assertions via OSNs
Anonymity is one of the main virtues of the Internet, as it protects privacy and enables users to express opinions more freely. However, anonymity hinders the assessment of the ve...
Michael Sirivianos, Kyungbaek Kim, Jian Wei Gan, X...
IEEEARES
2007
IEEE
15 years 6 months ago
Context-Dependent Access Control for Contextual Information
Abstract— Following Mark Weiser’s vision of ubiquitous computing and calm technology, computer systems should run in the background, preferably without the user noticing it at ...
Christin Groba, Stephan Grob, Thomas Springer
JMS
2010
139views more  JMS 2010»
14 years 10 months ago
Application of Portable CDA for Secure Clinical-document Exchange
Health Level Seven (HL7) organization published the Clinical Document Architecture (CDA) for exchanging documents among heterogeneous systems and improving medical quality based on...
Kuo-Hsuan Huang, Sung-huai Hsieh, Yuan-Jen Chang, ...
CHI
2008
ACM
16 years 5 days ago
Interactional empowerment
We propose that an interactional perspective on how emotion is constructed, shared and experienced, may be a good basis for designing affective interactional systems that do not i...
Anna Ståhl, Jarmo Laaksolahti, Kristina H&ou...
CCS
2006
ACM
15 years 3 months ago
An efficient key establishment scheme for secure aggregating sensor networks
Key establishment is a fundamental prerequisite for secure communication in wireless sensor networks. A new node joining the network needs to efficiently and autonomously set up s...
Erik-Oliver Blaß, Martina Zitterbart