Sciweavers

495 search results - page 42 / 99
» On Privacy And The Web
Sort
View
EUROPKI
2005
Springer
14 years 2 months ago
Installing Fake Root Keys in a PC
If a malicious party can insert a self-issued CA public key into the list of root public keys stored in a PC, then this party could potentially do considerable harm to that PC. In ...
Adil Alsaid, Chris J. Mitchell
DEXAW
2003
IEEE
94views Database» more  DEXAW 2003»
14 years 2 months ago
Experiences Running a Web Anonymising Service
The research project “AN.ON – Anonymity online” focuses on developing and providing a web anonymising service. This service provides anonymity and unobservability against ex...
Claudia Golembiewski, Marit Hansen, Sandra Steinbr...
AGENTS
1997
Springer
14 years 1 months ago
Ontology-based Web Agents
This paper describes SHOE, a set of Simple HTML Ontology Extensions which allow World-Wide Web authors to annotate their pages with semantic knowledge such as “I am a graduate s...
Sean Luke, Lee Spector, David Rager, James A. Hend...
CIKM
2008
Springer
13 years 11 months ago
Mirroring your web presence
This paper describes the starting points of how to design and build tools to help individual users track and monitor their presence on the web from the standpoints of individual p...
Markus Bylund, Jussi Karlgren, Fredrik Olsson, Ped...
ISPEC
2005
Springer
14 years 2 months ago
A Practical Aspect Framework for Enforcing Fine-Grained Access Control in Web Applications
Abstract. Access control is a system-wide concern that has both a generic nature and an application dependent characteristic. It is generic as many functions must be protected with...
Kung Chen, Chih-Mao Huang