Sciweavers

1618 search results - page 134 / 324
» Privacy Interfaces for Information Management
Sort
View
WPES
2003
ACM
14 years 2 months ago
Hidden Credentials
Hidden Credentials are useful in situations where requests for service, credentials, access policies and resources are extremely sensitive. We show how transactions which depend o...
Jason E. Holt, Robert W. Bradshaw, Kent E. Seamons...
CCS
1993
ACM
14 years 1 months ago
Why Cryptosystems Fail
Designers of cryptographic systems are at a disadvantage to most other engineers, in that information on how their systems fail is hard to get: their major users have traditionall...
Ross J. Anderson
XMLSEC
2003
ACM
14 years 2 months ago
A bitmap-based access control for restricted views of XML documents
The information on the web is growing at a very fast pace. In this ever-accumulating data, the volume of information represented in XML format is on the rise in recent times. An o...
Abhilash Gummadi, Jong P. Yoon, Biren Shah, Vijay ...
HT
2006
ACM
14 years 3 months ago
Harvesting social knowledge from folksonomies
Collaborative tagging systems, or folksonomies, have the potential of becoming technological infrastructure to support knowledge management activities in an organization or a soci...
Harris Wu, Mohammad Zubair, Kurt Maly
CHI
2009
ACM
14 years 9 months ago
Note to self: examining personal information keeping in a lightweight note-taking tool
This paper describes a longitudinal field experiment in personal note-taking that examines how people capture and use information in short textual notes. Study participants used o...
Max Van Kleek, Michael S. Bernstein, Katrina Panov...