Sciweavers

609 search results - page 89 / 122
» A Privacy Manager for Cloud Computing
Sort
View
ICONFERENCE
2011
13 years 2 months ago
Beyond promotion and protection: creators, audiences and common ground in user-generated media
In this paper, we present findings from a qualitative study of producers in a specific creative domain—online digital photography. We used social psychology and linguistic conce...
Eric C. Cook, Stephanie D. Teasley
EUROSEC
2008
ACM
13 years 9 months ago
A methodology for the repeatable forensic analysis of encrypted drives
In this paper we propose a sound methodology to perform the forensic analysis of hard disks protected with whole-disk encryption software, supposing to be in possession of the app...
Cory Altheide, Claudio Merloni, Stefano Zanero
ICMCS
2010
IEEE
146views Multimedia» more  ICMCS 2010»
13 years 9 months ago
Privacy-preserving approximation of L1 distance for multimedia applications
Alice and Bob possess sequences x and y respectively and would like to compute the 1 distance, namely x - y 1 under privacy and communication constraints. The privacy constraint r...
Shantanu Rane, Wei Sun, Anthony Vetro
COLCOM
2009
IEEE
14 years 16 days ago
Toward synchronization between decentralized orchestrations of composite web services
—Web service paradigm and related technologies have provided favorable means for the realization of collaborative business processes. From both conceptual and implementation poin...
Walid Fdhila, Claude Godart
HUC
2003
Springer
14 years 1 months ago
liquid: Context-Aware Distributed Queries
Abstract. As low-level architectural support for context-aware computing matures, we are ready to explore more general and powerful means of accessing context data. Information req...
Jeffrey Heer, Alan Newberger, Chris Beckmann, Jaso...