Sciweavers

708 search results - page 73 / 142
» Implementing access control to people location information
Sort
View
APLAS
2009
ACM
14 years 2 months ago
Ownership Downgrading for Ownership Types
Ownership types support information hiding by providing object-based encapsulation. However the static restrictions they impose on object accessibility can limit the expressiveness...
Yi Lu 0003, John Potter, Jingling Xue
WMCSA
2000
IEEE
14 years 5 days ago
The Roma personal metadata service
People now have available to them a diversity of digital storage devices, including palmtops, cell phone address books, laptops, desktop computers and web-based services. Unfortun...
Edward Swierk, Emre Kiciman, Vince Laviano, Mary B...
AUIC
2001
IEEE
13 years 11 months ago
Adapting the Web Interface: An Adaptive Web Browser
The growing number of mobile computing devices with diverse characteristics creates a requirement for seamless (device independent) access to computing resources of distributed sy...
Karen Henricksen, Jadwiga Indulska
DIMVA
2010
13 years 9 months ago
Covertly Probing Underground Economy Marketplaces
Cyber-criminals around the world are using Internet-based communication channels to establish trade relationships and complete fraudulent transactions. Furthermore, they control an...
Hanno Fallmann, Gilbert Wondracek, Christian Platz...
SIGSOFT
2003
ACM
14 years 8 months ago
Protecting C programs from attacks via invalid pointer dereferences
Writes via unchecked pointer dereferences rank high among vulnerabilities most often exploited by malicious code. The most common attacks use an unchecked string copy to cause a b...
Suan Hsi Yong, Susan Horwitz