Sciweavers

578 search results - page 69 / 116
» Deriving Semantic Models from Privacy Policies
Sort
View
SP
2010
IEEE
182views Security Privacy» more  SP 2010»
14 years 22 days ago
Object Capabilities and Isolation of Untrusted Web Applications
—A growing number of current web sites combine active content (applications) from untrusted sources, as in so-called mashups. The object-capability model provides an appealing ap...
Sergio Maffeis, John C. Mitchell, Ankur Taly
COGSCI
2006
68views more  COGSCI 2006»
13 years 9 months ago
The Interpretation of Classically Quantified Sentences: A Set-Theoretic Approach
Wepresentaset-theoreticmodelofthementalrepresentationofclassicallyquantifiedsentences(AllP are Q, Some P are Q, Some P are not Q,and No P are Q). We take inclusion, exclusion, and...
Guy Politzer, Jean-Baptiste Van der Henst, Claire ...
MDM
2007
Springer
279views Communications» more  MDM 2007»
14 years 3 months ago
Anonymity in Location-Based Services: Towards a General Framework
A general consensus is that the proliferation of locationaware devices will result in a diffusion of location-based services. Privacy preservation is a challenging research issue ...
Claudio Bettini, Sergio Mascetti, Xiaoyang Sean Wa...
ACISP
2008
Springer
14 years 3 months ago
Advanced Permission-Role Relationship in Role-Based Access Control
Abstract. Permission-role assignment is an important issue in rolebased access control (RBAC). There are two types of problems that may arise in permission-role assignment. One is ...
Min Li, Hua Wang, Ashley W. Plank, Jianming Yong
AIED
2007
Springer
14 years 3 months ago
Comparing Linguistic Features for Modeling Learning in Computer Tutoring
We compare the relative utility of different automatically computable linguistic feature sets for modeling student learning in computer dialogue tutoring. We use the PARADISE frame...
Katherine Forbes-Riley, Diane J. Litman, Amruta Pu...