Sciweavers

1618 search results - page 134 / 324
» Privacy Interfaces for Information Management
Sort
View
128
Voted
WPES
2003
ACM
15 years 9 months ago
Hidden Credentials
Hidden Credentials are useful in situations where requests for service, credentials, access policies and resources are extremely sensitive. We show how transactions which depend o...
Jason E. Holt, Robert W. Bradshaw, Kent E. Seamons...
115
Voted
CCS
1993
ACM
15 years 7 months ago
Why Cryptosystems Fail
Designers of cryptographic systems are at a disadvantage to most other engineers, in that information on how their systems fail is hard to get: their major users have traditionall...
Ross J. Anderson
140
Voted
XMLSEC
2003
ACM
15 years 9 months ago
A bitmap-based access control for restricted views of XML documents
The information on the web is growing at a very fast pace. In this ever-accumulating data, the volume of information represented in XML format is on the rise in recent times. An o...
Abhilash Gummadi, Jong P. Yoon, Biren Shah, Vijay ...
163
Voted
HT
2006
ACM
15 years 9 months ago
Harvesting social knowledge from folksonomies
Collaborative tagging systems, or folksonomies, have the potential of becoming technological infrastructure to support knowledge management activities in an organization or a soci...
Harris Wu, Mohammad Zubair, Kurt Maly
99
Voted
CHI
2009
ACM
16 years 4 months ago
Note to self: examining personal information keeping in a lightweight note-taking tool
This paper describes a longitudinal field experiment in personal note-taking that examines how people capture and use information in short textual notes. Study participants used o...
Max Van Kleek, Michael S. Bernstein, Katrina Panov...