Sciweavers

4445 search results - page 797 / 889
» Reflective Authorization Systems
Sort
View
CHI
2010
ACM
14 years 10 months ago
How routine learners can support family coordination
Researchers have detailed the importance of routines in how people live and work, while also cautioning system designers about the importance of people's idiosyncratic behavi...
Scott Davidoff, John Zimmerman, Anind K. Dey
CCS
2010
ACM
14 years 10 months ago
Hierarchical attribute-based encryption for fine-grained access control in cloud storage services
Cloud computing, as an emerging computing paradigm, enables users to remotely store their data into a cloud so as to enjoy scalable services on-demand. Especially for small and me...
Guojun Wang, Qin Liu, Jie Wu
SIGMETRICS
2010
ACM
193views Hardware» more  SIGMETRICS 2010»
14 years 10 months ago
Distributed caching over heterogeneous mobile networks
Sharing content over a mobile network through opportunistic contacts has recently received considerable attention. In proposed scenarios, users store content they download in a lo...
Stratis Ioannidis, Laurent Massoulié, Augus...
WISEC
2010
ACM
14 years 10 months ago
Mobile user location-specific encryption (MULE): using your office as your password
Data breaches due to stolen laptops are a major problem. Solutions exist to secure sensitive files on laptops, but are rarely deployed because users view them as inconvenient. Thi...
Ahren Studer, Adrian Perrig
CSCW
2006
ACM
14 years 10 months ago
Loose Coupling and Healthcare Organizations: Deployment Strategies for Groupware
Healthcare organizations are often organized in a modular, loosely coupled fashion where separate and semi-autonomous work units specialize in different areas of care delivery. Thi...
David Pinelle, Carl Gutwin