Sciweavers

1818 search results - page 102 / 364
» How users use access control
Sort
View
ACSAC
2002
IEEE
14 years 2 months ago
A Context-Aware Security Architecture for Emerging Applications
We describe an approach to building security services for context-aware environments. Specifically, we focus on the design of security services that incorporate the use of securi...
Michael J. Covington, Prahlad Fogla, Zhiyuan Zhan,...
CSE
2009
IEEE
14 years 4 months ago
Usable Privacy Controls for Blogs
—Web 2.0 applications, including blogs, wikis and social networking sites, pose challenging privacy issues. Many users are unaware that search engines index personal information ...
Michael Hart, Claude Castille, Rob Johnson, Amanda...
CIKM
2001
Springer
14 years 1 months ago
Exploiting A Controlled Vocabulary to Improve Collection Selection and Retrieval Effectiveness
Vocabulary incompatibilities arise when the terms used to index a document collection are largely unknown, or at least not well-known to the users who eventually search the collec...
James C. French, Allison L. Powell, Fredric C. Gey...
CSCW
2008
ACM
13 years 11 months ago
Family accounts: a new paradigm for user accounts within the home environment
In this paper we present Family Accounts, a new user account model for shared home computers. We conducted a study with sixteen families, eight who used individual profiles at hom...
Serge Egelman, A. J. Bernheim Brush, Kori M. Inkpe...
ICONFERENCE
2011
13 years 4 months ago
Loose strands: searching for evidence of public access ICT impact on development
Telecenters, libraries and internet cafés are often credited as being important venues for making information and communication technologies (ICTs) more widely available for peop...
Araba Sey, Michelle Fellows