Sciweavers

202 search results - page 33 / 41
» Managing Pervasive Environment Privacy Using the
Sort
View
ACSAC
1999
IEEE
13 years 12 months ago
Tools to Support Secure Enterprise Computing
Secure enterprise programming is a difficult and tedious task. Programmers need tools that support t levels of abstraction and that track all the components that participate in di...
Myong H. Kang, Brian J. Eppinger, Judith N. Frosch...
CBMS
2001
IEEE
13 years 11 months ago
An Interoperable Data Architecture for Data Exchange in a Biomedical Research Network
Knowledge discovery and data correlation require a unified approach to basic data management. However, achieving such an approach is nearly impossible with hundreds of disparate d...
Daniel J. Crichton, J. Steven Hughes, Gregory J. D...
SOUPS
2009
ACM
14 years 2 months ago
How users use access control
Existing technologies for file sharing differ widely in the granularity of control they give users over who can access their data; achieving finer-grained control generally requ...
Diana K. Smetters, Nathan Good
GI
2005
Springer
14 years 1 months ago
Distributed User Modeling for Situated Interaction
: A distributed service to model and control contextual information in mobile and ubiquitous computing environments is presented in this paper. We introduce the general user model ...
Dominik Heckmann
CSREASAM
2006
13 years 9 months ago
A Framework for the User-Oriented Personal Information Protection
- Thanks to the spread of mobile technologies, we can access to the network anytime and from anywhere. In the near future, we will enable to realize the ubiquitous computing enviro...
Kenichi Takahashi, Kouichi Sakurai