Sciweavers

370 search results - page 57 / 74
» Design for Privacy in Ubiquitous Computing Environments
Sort
View
CCS
2009
ACM
14 years 2 months ago
Physically restricted authentication with trusted hardware
Modern computer systems permit users to access protected information from remote locations. In certain secure environments, it would be desirable to restrict this access to a part...
Michael S. Kirkpatrick, Elisa Bertino
CSFW
1992
IEEE
14 years 1 days ago
Attribute Support for Inter-Domain Use
Mary Ellen Zurko Laboratory for Computer Science Massachusetts Institute of Technology and Digital Equipment Corporation Littleton, MA, 01460 This paper describes the User Attribu...
Mary Ellen Zurko
ACSAC
2001
IEEE
13 years 11 months ago
Determining Privileges of Mobile Agents
This paper describes a method for controlling the behavior of mobile agent-system entities through the allocation of privileges. Privileges refer to policy rules that govern the a...
Wayne A. Jansen
UM
2009
Springer
14 years 2 months ago
Predicting Customer Models Using Behavior-Based Features in Shops
Abstract. Recent sensor technologies have enabled the capture of users’ behavior data. Given the large amount of data currently available from sensor-equipped environments, it is...
Junichiro Mori, Yutaka Matsuo, Hitoshi Koshiba, Ke...
CSCW
1998
ACM
13 years 7 months ago
Community Support for Constructionist Learning
MOOSE Crossing is a text-based virtual reality environment (or “MUD”) designed to be a constructionist learning environment for children ages eight to thirteen. The constructio...
Amy Bruckman