Sciweavers

1618 search results - page 9 / 324
» Privacy Interfaces for Information Management
Sort
View
INTERACT
2007
13 years 9 months ago
Usability Challenges in Security and Privacy Policy-Authoring Interfaces
Abstract. Policies, sets of rules that govern permission to access resources, have long been used in computer security and online privacy management; however, the usability of auth...
Robert W. Reeder, Clare-Marie Karat, John Karat, C...
FC
2009
Springer
121views Cryptology» more  FC 2009»
14 years 2 months ago
Achieving Privacy in a Federated Identity Management System
Federated identity management allows a user to efficiently authenticate and use identity information from data distributed across multiple domains. The sharing of data across domai...
Susan Landau, Hubert Lê Van Gông, Robi...
CSFW
2011
IEEE
12 years 7 months ago
Security for Key Management Interfaces
—We propose a much-needed formal definition of security for cryptographic key management APIs. The advantages of our definition are that it is general, intuitive, and applicabl...
Steve Kremer, Graham Steel, Bogdan Warinschi
INTERACT
2003
13 years 9 months ago
Project InfoSpace: From Information Managing to Information Representation
: The Desktop metaphor has repeatedly been declared antiquated in various ways. It nevertheless continues existing. Despite the widely pronounced critique, it is still not clear wh...
Pamela Ravasio, Ljiljana Vukelja, Gabrio Rivera, M...
VLDB
2007
ACM
295views Database» more  VLDB 2007»
14 years 1 months ago
From Data Privacy to Location Privacy: Models and Algorithms
This tutorial presents the definition, the models and the techniques of location privacy from the data privacy perspective. By reviewing and revising the state of art research in ...
Ling Liu