Sciweavers

144 search results - page 7 / 29
» A Model to Incorporate Privacy in Organizational Memory Syst...
Sort
View
CSCW
2006
ACM
14 years 20 days ago
Structuring and supporting persistent chat conversations
Persistence of conversations has been found to be a useful feature in group chat tools. When conversations are stored and made accessible to all members of a group, they can facil...
David Fono, Ronald Baecker
CCS
2007
ACM
14 years 27 days ago
Non-volatile memory and disks: avenues for policy architectures
As computing models change, so too do the demands on storage. Distributed and virtualized systems introduce new vulnerabilities, assumptions, and performance requirements on disks...
Kevin R. B. Butler, Stephen E. McLaughlin, Patrick...
CCS
2010
ACM
13 years 5 months ago
Protecting location privacy against inference attacks
GPS-enabled mobile devices are a quickly growing market and users are starting to share their location information with each other through services such as Google Latitude. Locati...
Kazuhiro Minami, Nikita Borisov
CHI
1998
ACM
13 years 11 months ago
Cognitive Function Analysis for Human-Centered Automation of Safety-Critical Systems
The Cognitive Function Analysis is a methodology supportedby a mediating tool for the human-centered automationof safety-critical systems[4]. It is basedon a socio-cognitive model...
Guy A. Boy
CCS
2008
ACM
13 years 8 months ago
Mutual authentication in RFID: security and privacy
In RFID protocols, tags identify and authenticate themselves to readers. At Asiacrypt 2007, Vaudenay studied security and privacy models for these protocols. We extend this model ...
Radu-Ioan Paise, Serge Vaudenay