Sciweavers

1818 search results - page 140 / 364
» How users use access control
Sort
View
TOCHI
1998
89views more  TOCHI 1998»
13 years 9 months ago
Using Metalevel Techniques in a Flexible Toolkit for CSCW Applications
Ideally, software toolkits for collaborative applications should provide generic, reusable components, applicable in a wide range of circumstances, which software developers can as...
Paul Dourish
CSCW
2004
ACM
14 years 1 months ago
Leveraging social networks for information sharing
Saori is a computation infrastructure that enables users and enduser applications to leverage social networks to mediate information dissemination. Saori provides users with aware...
Jeremy Goecks, Elizabeth D. Mynatt
ICAT
2006
IEEE
14 years 3 months ago
Study on Data Collaboration Service for Collaborative Virtual Geographic Environment
The use of Collaborative Virtual Geographic Environments (CVGE) is one of the most promising uses of virtual reality in geographic field. Data collaboration can support multi-direc...
Jun Zhu, Jianhua Gong, Hua Qi, Tao Song
WMASH
2003
ACM
14 years 2 months ago
Secure authentication system for public WLAN roaming
A serious challenge for seamless roaming between independent wireless LANs (WLANs) is how best to confederate the various WLAN service providers, each having different trust relat...
Yasuhiko Matsunaga, Ana Sanz Merino, Takashi Suzuk...
NSDI
2007
13 years 11 months ago
TightLip: Keeping Applications from Spilling the Beans
Access control misconfigurations are widespread and can result in damaging breaches of confidentiality. This paper presents TightLip, a privacy management system that helps user...
Aydan R. Yumerefendi, Benjamin Mickle, Landon P. C...