Sciweavers

708 search results - page 78 / 142
» Implementing access control to people location information
Sort
View
JAIR
2010
143views more  JAIR 2010»
13 years 6 months ago
A Utility-Theoretic Approach to Privacy in Online Services
Online offerings such as web search, news portals, and e-commerce applications face the challenge of providing high-quality service to a large, heterogeneous user base. Recent eff...
Andreas Krause, Eric Horvitz
WSCG
2000
97views more  WSCG 2000»
13 years 9 months ago
Human Movement Instruction System that Utilizes Avatar Overlays Using Stereoscopic Images
In the Mixed Reality environment that combines the real world and the virtual world it is important to control the 'place' that comprises both real and virtual objects. ...
Masayuki Ihara, Yoshihiro Shimada, Kenichi Kida, S...
ACSAC
2002
IEEE
14 years 23 days ago
A Practical Approach to Identifying Storage and Timing Channels: Twenty Years Later
Secure computer systems use both mandatory and discretionary access controls to restrict the flow of information through legitimate communication channels such as files, shared ...
Richard A. Kemmerer
SACMAT
2004
ACM
14 years 1 months ago
Role-based cascaded delegation
We propose role-based cascaded delegation, a model for delegation of authority in decentralized trust management systems. We show that role-based cascaded delegation combines the ...
Roberto Tamassia, Danfeng Yao, William H. Winsboro...
CDC
2008
IEEE
139views Control Systems» more  CDC 2008»
14 years 2 months ago
Human-in-the-loop vehicle routing policies for dynamic environments
— In this paper we design coordination policies for a routing problem requiring human-assisted classification of targets through analysis of information gathered on-site by auto...
Ketan Savla, Tom Temple, Emilio Frazzoli