Sciweavers

206 search results - page 35 / 42
» Inferring privacy policies for social networking services
Sort
View
INFOCOM
2009
IEEE
14 years 2 months ago
A Sybilproof Indirect Reciprocity Mechanism for Peer-to-Peer Networks
Abstract— Although direct reciprocity (Tit-for-Tat) contribution systems have been successful in reducing freeloading in peerto-peer overlays, it has been shown that, unless the ...
Raul Landa, David Griffin, Richard G. Clegg, Eleni...
CSFW
2006
IEEE
14 years 1 months ago
A Framework for Establishing Decentralized Secure Coalitions
A coalition provides a virtual space across a network that allows its members to interact in a transparent manner. Coalitions may be formed for a variety of purposes. These range ...
Hongbin Zhou, Simon N. Foley
WMASH
2003
ACM
14 years 1 months ago
Secure authentication system for public WLAN roaming
A serious challenge for seamless roaming between independent wireless LANs (WLANs) is how best to confederate the various WLAN service providers, each having different trust relat...
Yasuhiko Matsunaga, Ana Sanz Merino, Takashi Suzuk...
NSPW
2006
ACM
14 years 1 months ago
Googling considered harmful
Virtually every Internet user on the planet uses the powerful free tools offered by a handful of information service providers in many aspects of their personal and professional l...
Gregory J. Conti
ICALT
2008
IEEE
14 years 2 months ago
Moving Towards Life-Long User Modeling
User Modeling is the core component for the majority of personalization services. It has become an important factor in the effort to personalise a diversity of web resources accor...
Demetris Kyriacou, Hugh C. Davis