Sciweavers

335 search results - page 23 / 67
» Personalized access control for a personally controlled heal...
Sort
View
EL
2011
86views more  EL 2011»
12 years 7 months ago
The use of metadata and preservation methods for continuous access to digital data
Data loss prevention starts with the creation of a digital object. However, methods to minimize the loss of digital data are often ignored, the use of metadata structures embedded...
Ria Groenewald, Amelia Breytenbach
W4A
2004
ACM
14 years 1 months ago
The user experience: designs and adaptations
Specifications for accessibility of Web page do not necessarily guarantee a usable or satisfying Web experience for persons with disabilities. The needs of many of these individua...
Vicki L. Hanson
TEI
2009
ACM
172views Hardware» more  TEI 2009»
14 years 2 months ago
SLAPbook: tangible widgets on multi-touch tables in groupware environments
We present SLAPbook, an application using SLAP, translucent and tangible widgets for use on vision-based multi-touch tabletops in Single Display Groupware (SDG) environments. SLAP...
Malte Weiss, Julie Wagner, Roger Jennings, Yvonne ...
WISA
2009
Springer
14 years 2 months ago
Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application
In Ciphertext-Policy Attribute-Based Encryption (CP-ABE), a user secret key is associated with a set of attributes, and the ciphertext is associated with an access policy over attr...
Luan Ibraimi, Milan Petkovic, Svetla Nikova, Piete...
SIGMETRICS
2012
ACM
257views Hardware» more  SIGMETRICS 2012»
11 years 10 months ago
Fair sampling across network flow measurements
Sampling is crucial for controlling resource consumption by internet traffic flow measurements. Routers use Packet Sampled NetFlow [9], and completed flow records are sampled in...
Nick G. Duffield