Sciweavers

478 search results - page 74 / 96
» Privacy and pricing personal information
Sort
View
CSE
2009
IEEE
14 years 3 months ago
Social Inference Risk Modeling in Mobile and Social Applications
— The emphasis of emerging mobile and Web 2.0 applications on collaboration and communication increases threats to user privacy. A serious, yet under-researched privacy risk resu...
Sara Motahari, Sotirios G. Ziavras, Mor Naaman, Mo...
CSCW
2006
ACM
14 years 2 months ago
Providing artifact awareness to a distributed group through screen sharing
Despite the availability of awareness servers and casual interaction systems, distributed groups still cannot maintain artifact awareness – the easy awareness of the documents, ...
Kimberly Tee, Saul Greenberg, Carl Gutwin
SP
2002
IEEE
129views Security Privacy» more  SP 2002»
13 years 8 months ago
The XCAT Science Portal
The design and prototype implementation of the XCAT Grid Science Portal is described in this paper. The portal lets grid application programmers easily script complex distributed ...
Sriram Krishnan, Randall Bramley, Dennis Gannon, R...
CCS
2009
ACM
14 years 3 months ago
Dynamic provable data possession
As storage-outsourcing services and resource-sharing networks have become popular, the problem of efficiently proving the integrity of data stored at untrusted servers has receiv...
C. Christopher Erway, Alptekin Küpç&uu...
SP
2003
IEEE
116views Security Privacy» more  SP 2003»
14 years 1 months ago
Garbage Collector Memory Accounting in Language-Based Systems
Language run-time systems are often called upon to safely execute mutually distrustful tasks within the same runtime, protecting them from other tasks’ bugs or otherwise hostile...
David W. Price, Algis Rudys, Dan S. Wallach