Sciweavers

708 search results - page 64 / 142
» Implementing access control to people location information
Sort
View
WISEC
2010
ACM
13 years 8 months ago
Mobile user location-specific encryption (MULE): using your office as your password
Data breaches due to stolen laptops are a major problem. Solutions exist to secure sensitive files on laptops, but are rarely deployed because users view them as inconvenient. Thi...
Ahren Studer, Adrian Perrig
BPSC
2009
190views Business» more  BPSC 2009»
13 years 9 months ago
Detective Information Flow Analysis for Business Processes
Abstract: We report on ongoing work towards a posteriori detection of illegal information flows for business processes, focusing on the challenges involved in doing so. Resembling ...
Rafael Accorsi, Claus Wonnemann
DRM
2009
Springer
14 years 2 months ago
Videosurveillance and privacy: covering the two sides of the mirror with DRM
Privacy and security have always been key concerns for individuals. They have also been closely related concepts: in order to increase their perception of security, people sacriï¬...
Juan Ramón Troncoso-Pastoriza, Pedro Comesa...
SEMWEB
2009
Springer
14 years 2 months ago
Using Hybrid Search and Query for E-discovery Identification
: © Using hybrid search and query for e-discovery identification Dave Grosvenor, Andy Seaborne HP Laboratories HPL-2009-155 SPARQL, e-discovery, identification, hybrid search and ...
Dave Grosvenor, Andy Seaborne
ICDCSW
2002
IEEE
14 years 23 days ago
TWSAPI: A Generic Teamwork Services Application Programming Interface
One of the problems faced by large, global organizations and enterprises is to effectively enable their employees to collaborate across locations. People need collaborative work s...
Engin Kirda, Gerald Reif, Harald Gall, Pascal Fenk...