Sciweavers

343 search results - page 15 / 69
» The All-In Publication Policy
Sort
View
RE
2001
Springer
15 years 1 months ago
The Role of Policy and Stakeholder Privacy Values in Requirements Engineering
Diverse uses of information technology (IT) in organizations affect privacy. Developers of electronic commerce, database management, security mechanisms, telecommunication and col...
Annie I. Antón, Julia Brande Earp, Thomas A...
CHI
2009
ACM
15 years 10 months ago
Designing a privacy label: assisting consumer understanding of online privacy practices
This project describes the continuing development of a Privacy Label to present to consumers the ways organizations collect, use, and share personal information. Several studies h...
Patrick Gage Kelley
WECWIS
2009
IEEE
198views ECommerce» more  WECWIS 2009»
15 years 4 months ago
Bridging the Gap between User Attributes and Service Policies with Attribute Mapping
—People, companies, and public authorities can now have a strong on-line presence and a huge amount of interactions on the Internet, made possible by the impressive growth of the...
Davide Cerri, Francesco Corcoglioniti
ICRA
2005
IEEE
121views Robotics» more  ICRA 2005»
15 years 3 months ago
Modeling and Analysis of Beaconless and Beacon-Based Policies for a Swarm-Intelligent Inspection System
Abstract— We are developing a swarm-intelligent inspection system based on a swarm of autonomous, miniature robots, using only on-board, local sensors. To estimate intrinsic adva...
Nikolaus Correll, Alcherio Martinoli
SACMAT
2004
ACM
15 years 2 months ago
Using trust and risk in role-based access control policies
Emerging trust and risk management systems provide a framework for principals to determine whether they will exchange resources, without requiring a complete definition of their ...
Nathan Dimmock, András Belokosztolszki, Dav...