Sciweavers

744 search results - page 95 / 149
» The Traust Authorization Service
Sort
View
CHI
2004
ACM
15 years 10 months ago
User profiling
A number of global trends have a large influence on the way we use technology in our life and work, like: ? increasing connectivity and connected devices (any time, any place, any...
Johan Schuurmans, Boris E. R. de Ruyter, Harry van...
IUI
2009
ACM
15 years 6 months ago
Understanding the intent behind mobile information needs
Mobile phones are becoming increasingly popular as a means of information access while on-the-go. Mobile users are likely to be interested in locating different types of content. ...
Karen Church, Barry Smyth
CSE
2009
IEEE
15 years 4 months ago
FaceCloak: An Architecture for User Privacy on Social Networking Sites
—Social networking sites, such as MySpace, Facebook and Flickr, are gaining more and more popularity among Internet users. As users are enjoying this new style of networking, pri...
Wanying Luo, Qi Xie, Urs Hengartner
OTM
2007
Springer
15 years 4 months ago
Prevention of Cross-Site Scripting Attacks on Current Web Applications
Security is becoming one of the major concerns for web applications and other Internet based services, which are becoming pervasive in all kinds of business models and organization...
Joaquín García-Alfaro, Guillermo Nav...
CSFW
2006
IEEE
15 years 3 months ago
A Framework for Establishing Decentralized Secure Coalitions
A coalition provides a virtual space across a network that allows its members to interact in a transparent manner. Coalitions may be formed for a variety of purposes. These range ...
Hongbin Zhou, Simon N. Foley