Sciweavers

139 search results - page 17 / 28
» Exploiting information relationships for access control in p...
Sort
View
CORR
2010
Springer
167views Education» more  CORR 2010»
13 years 7 months ago
Development of a Context Aware Virtual Smart Home Simulator
Context awareness is the most important research area in ubiquitous computing. In particular, for smart home, context awareness attempts to bring the best services to the home hab...
Tam Van Nguyen, Huy Anh Nguyen, Deokjai Choi
COLCOM
2009
IEEE
14 years 8 days ago
Towards automatic privacy management in Web 2.0 with semantic analysis on annotations
— Sharing personal information and documents is pervasive in Web 2.0 environments, which creates the need for properly controlling shared data. Most existing authorization and po...
Nitya Vyas, Anna Cinzia Squicciarini, Chih-Cheng C...
ESORICS
2004
Springer
14 years 28 days ago
Parameterized Authentication
We describe an approach to sensor-based authentication that can adapt to accommodate incomplete, unreliable, or inaccurate input provided to the system. Parameterized Authenticatio...
Michael J. Covington, Mustaque Ahamad, Irfan A. Es...
SACMAT
2011
ACM
12 years 10 months ago
Modeling data flow in socio-information networks: a risk estimation approach
Information leakage via the networks formed by subjects (e.g., Facebook, Twitter) and objects (e.g., blogosphere) − some of whom may be controlled by malicious insiders − ofte...
Ting Wang, Mudhakar Srivatsa, Dakshi Agrawal, Ling...
WMPI
2004
ACM
14 years 29 days ago
Addressing mode driven low power data caches for embedded processors
The size and speed of first-level caches and SRAMs of embedded processors continue to increase in response to demands for higher performance. In power-sensitive devices like PDAs a...
Ramesh V. Peri, John Fernando, Ravi Kolagotla