Sciweavers

694 search results - page 56 / 139
» Security and Usability: Analysis and Evaluation
Sort
View
SOUPS
2005
ACM
15 years 5 months ago
Developing privacy guidelines for social location disclosure applications and services
In this article, we describe the design process of Reno, a location-enhanced, mobile coordination tool and person finder. The design process included three field experiments: a ...
Giovanni Iachello, Ian E. Smith, Sunny Consolvo, M...
CORR
2011
Springer
174views Education» more  CORR 2011»
14 years 6 months ago
Distributed Private Data Analysis: On Simultaneously Solving How and What
We examine the combination of two directions in the field of privacy concerning computations over distributed private inputs – secure function evaluation (SFE) and differential...
Amos Beimel, Kobbi Nissim, Eran Omri
SOUPS
2006
ACM
15 years 5 months ago
An empirical study of natural language parsing of privacy policy rules using the SPARCLE policy workbench
Today organizations do not have good ways of linking their written privacy policies with the implementation of those policies. To assist organizations in addressing this issue, ou...
Carolyn Brodie, Clare-Marie Karat, John Karat
CIVR
2004
Springer
194views Image Analysis» more  CIVR 2004»
15 years 5 months ago
A Test-Bed for Region-Based Image Retrieval Using Multiple Segmentation Algorithms and the MPEG-7 eXperimentation Model: The Sch
The aim of the SCHEMA Network of Excellence is to bring together a critical mass of universities, research centers, industrial partners and end users, in order to design a referenc...
Vasileios Mezaris, Haralambos Doulaverakis, Raul M...
OTM
2010
Springer
14 years 10 months ago
Using Real Option Thinking to Improve Decision Making in Security Investment
Making well-founded security investment decisions is hard: several alternatives may need to be considered, the alternatives’ space is often diffuse, and many decision parameters...
Virginia N. L. Franqueira, Siv Hilde Houmb, Maya D...