Sciweavers

666 search results - page 80 / 134
» Collaborative Planning With Privacy
Sort
View
NDSS
1997
IEEE
13 years 12 months ago
Distributed Authentication in Kerberos Using Public Key Cryptography
In this work we describe a method for fully distributed authentication using public key cryptography within the Kerberos ticket framework. By distributing most of the authenticati...
Marvin A. Sirbu, John C.-I. Chuang
NSDI
2008
13 years 10 months ago
Ad-hoc Guesting: When Exceptions Are the Rule
People's work days are filled with exceptions to normal routine. These exceptions affect the security and privacy of their information access and sharing. In a recent ethnogr...
Brinda Dalal, Les Nelson, Diana K. Smetters, Natha...
INTERACT
2003
13 years 9 months ago
Interaction with Context-Aware Mobile Hand-Held Devices
: Interaction with context-aware mobile hand-held devices creates new demands for user interfaces and interaction methods. These devices, which detect the use context in order to a...
Jonna Häkkilä
ASM
2010
ASM
13 years 7 months ago
Matelas: A Predicate Calculus Common Formal Definition for Social Networking
This paper presents Matelas, a B predicate calculus definition for social networking, modelling social-network content, privacy policies, social-networks friendship relations, and ...
Néstor Cataño, Camilo Rueda
ICSOC
2005
Springer
14 years 1 months ago
Trust-Based Secure Workflow Path Construction
—Service-oriented computing promotes collaboration by defining the standards layer that allows compatibility between disparate domains. Workflows, by taking advantage of the serv...
Mine Altunay, Douglas E. Brown, Gregory T. Byrd, R...