Sciweavers

1618 search results - page 172 / 324
» Privacy Interfaces for Information Management
Sort
View
CHI
2007
ACM
14 years 9 months ago
Give and take: a study of consumer photo-sharing culture and practice
In this paper, we present initial findings from the study of a digital photo-sharing website: Flickr.com. In particular, we argue that Flickr.com appears to support--for some peop...
Andrew D. Miller, W. Keith Edwards
SOUPS
2009
ACM
14 years 3 months ago
Not one click for security?
: © Not One Click for Security Alan H. Karp, Marc Stiegler, Tyler Close HP Laboratories HPL-2009-53 Secure cooperation, usable security Conventional wisdom holds that security mus...
Alan H. Karp, Marc Stiegler, Tyler Close
CSFW
2008
IEEE
14 years 3 months ago
Evidence-Based Audit
Authorization logics provide a principled and flexible approach to specifying access control policies. One of their compelling benefits is that a proof in the logic is evidence ...
Jeffrey A. Vaughan, Limin Jia, Karl Mazurak, Steve...
CCS
2007
ACM
14 years 3 months ago
Non-volatile memory and disks: avenues for policy architectures
As computing models change, so too do the demands on storage. Distributed and virtualized systems introduce new vulnerabilities, assumptions, and performance requirements on disks...
Kevin R. B. Butler, Stephen E. McLaughlin, Patrick...
CSCW
2006
ACM
14 years 3 months ago
Providing artifact awareness to a distributed group through screen sharing
Despite the availability of awareness servers and casual interaction systems, distributed groups still cannot maintain artifact awareness – the easy awareness of the documents, ...
Kimberly Tee, Saul Greenberg, Carl Gutwin