Sciweavers

875 search results - page 111 / 175
» Requirements for Context-Dependent Mobile Access to Informat...
Sort
View
SOUPS
2010
ACM
15 years 1 months ago
On the impact of real-time feedback on users' behaviour in mobile location-sharing applications
Effective privacy management requires that mobile systems‟ users be able to make informed privacy decisions as their experience and knowledge of a system progresses. Prior work ...
Lukasz Jedrzejczyk, Blaine A. Price, Arosha K. Ban...
OZCHI
2009
ACM
15 years 4 months ago
My phone is my keypad: privacy-enhanced PIN-entry on public terminals
More and more services are available on public terminals. Due to their public location and permanent availability, they can easily fall victim to manipulation. These manipulations...
Alexander De Luca, Bernhard Frauendienst, Sebastia...
MHCI
2009
Springer
15 years 4 months ago
Exploring the urban environment with a camera phone: lessons from a user study
We present a study investigating two novel mobile services supporting querying for information in the urban environment using camera equipped smart phones as well as two different...
Norman Höller, Arjan Geven, Manfred Tscheligi...
SIGSOFT
2010
ACM
14 years 7 months ago
Software for everyone by everyone
Given the dizzying pace of change in computer science, trying to look too far into the future of software engineering is hard. However, it might be possible to predict the future ...
Tevfik Bultan
SACMAT
2003
ACM
15 years 3 months ago
An approach to engineer and enforce context constraints in an RBAC environment
This paper presents an approach that uses special purpose RBAC constraints to base certain access control decisions on context information. In our approach a context constraint is...
Gustaf Neumann, Mark Strembeck