Sciweavers

592 search results - page 61 / 119
» Learning of personalized security settings
Sort
View
AGENTS
2000
Springer
14 years 5 days ago
BoB: an interactive improvisational music companion
This paper introduces a new domain for believable agents (BA) and presents novel methods for dealing with the unique challenges that arise therein. The domain is providing improvi...
Belinda Thom
CCS
2011
ACM
12 years 7 months ago
Policy auditing over incomplete logs: theory, implementation and applications
We present the design, implementation and evaluation of an algorithm that checks audit logs for compliance with privacy and security policies. The algorithm, which we name reduce,...
Deepak Garg, Limin Jia, Anupam Datta
UIALL
2004
Springer
14 years 1 months ago
A Question of Realism
Abstract. We present the results of an exploratory study investigating the feasibility of using multimedia software to teach life skills to adults with learning difficulties. As a ...
Richard Hetherington, Alison Crerar, Phil Turner
WWW
2010
ACM
14 years 2 months ago
Object views: fine-grained sharing in browsers
Browsers do not currently support the secure sharing of JavaScript objects between principals. We present this problem as the need for object views, which are consistent and contr...
Leo A. Meyerovich, Adrienne Porter Felt, Mark S. M...
SACMAT
2009
ACM
14 years 2 months ago
xDomain: cross-border proofs of access
A number of research systems have demonstrated the benefits of accompanying each request with a machine-checkable proof that the request complies with access-control policy — a...
Lujo Bauer, Limin Jia, Michael K. Reiter, David Sw...