Sciweavers

449 search results - page 36 / 90
» User experiences with sharing and access control
Sort
View
IJCMAM
2010
160views more  IJCMAM 2010»
14 years 10 months ago
Exploring Type-and-Identity-Based Proxy Re-Encryption Scheme to Securely Manage Personal Health Records
Commercial Web-based Personal-Health Record (PHR) systems can help patients to share their personal health records (PHRs) anytime from anywhere. PHRs are very sensitive data and an...
Luan Ibraimi, Qiang Tang, Pieter H. Hartel, Willem...
LCN
2007
IEEE
15 years 7 months ago
A Prototype Power Management Proxy for Gnutella Peer-to-Peer File Sharing
— In order to be part of a peer-to-peer (P2P) file sharing network a host must be fully powered-on all of the time. In addition to providing a user interface, a P2P host handles ...
Miguel Jimeno, Kenneth J. Christensen
SOUPS
2005
ACM
15 years 7 months ago
Two experiences designing for effective security
In our research, we have been concerned with the question of how to make relevant features of security situations visible to users in order to allow them to make informed decision...
Rogério de Paula, Xianghua Ding, Paul Douri...
TWC
2008
98views more  TWC 2008»
15 years 1 months ago
A Queue-Based Approach to Power Control in Wireless Communication Networks
In modern wireless communication systems, power control plays a fundamental role for efficient resource utilization, in particular in the systems where the users share the same ban...
Luigi Chisci, Romano Fantacci, Lorenzo Mucchi, Tom...
CCS
2007
ACM
15 years 7 months ago
Automaton segmentation: a new approach to preserve privacy in xml information brokering
A Distributed Information Brokering System (DIBS) is a peer-to-peer overlay network that comprises diverse data servers and brokering components helping client queries locate the ...
Fengjun Li, Bo Luo, Peng Liu, Dongwon Lee, Chao-Hs...