Sciweavers

1790 search results - page 245 / 358
» On Privacy Models for RFID
Sort
View
AINA
2009
IEEE
15 years 9 months ago
Location-Aware Authentication and Access Control
—The paper first discusses motivations why taking into account location information in authentication and access control is important. The paper then surveys current approaches t...
Elisa Bertino, Michael S. Kirkpatrick
COMPCON
1995
IEEE
15 years 7 months ago
NetBill: An Internet Commerce System Optimized for Network Delivered Services
Netbill is a business model, set of protocols, and software implementation for commerce in information goods and other network delivered services. It has very low transaction cost...
Marvin A. Sirbu, J. D. Tygar
HICSS
1994
IEEE
117views Biometrics» more  HICSS 1994»
15 years 7 months ago
Providing for Organizational Memory in Computer-Supported Meetings
Meeting memory features are poorly integrated into current group support systems (GSS). This paper discusses how to introduce meeting memory functionality into a GSS. The paper fi...
Gerhard Schwabe
AISM
2004
15 years 5 months ago
PKI - Advantages and Obstacles
Electronic communications have become the most important kind of communications in business. However, trust, privacy and security have become the great challenges for business and...
A. Jancic, Matthew J. Warren
ASM
2010
ASM
15 years 4 months ago
Matelas: A Predicate Calculus Common Formal Definition for Social Networking
This paper presents Matelas, a B predicate calculus definition for social networking, modelling social-network content, privacy policies, social-networks friendship relations, and ...
Néstor Cataño, Camilo Rueda