Sciweavers

478 search results - page 75 / 96
» Privacy and pricing personal information
Sort
View
CCS
2005
ACM
14 years 2 months ago
Automated trust negotiation using cryptographic credentials
In automated trust negotiation (ATN), two parties exchange digitally signed credentials that contain attribute information to establish trust and make access control decisions. Be...
Jiangtao Li, Ninghui Li, William H. Winsborough
WPES
2003
ACM
14 years 1 months ago
Policy migration for sensitive credentials in trust negotiation
Trust negotiation is an approach to establishing trust between strangers through the bilateral, iterative disclosure of digital credentials. Under automated trust negotiation, acc...
Ting Yu, Marianne Winslett
DIM
2005
ACM
13 years 10 months ago
Pseudonym management using mediated identity-based cryptography
Mobile Location-Based Services (LBS) have raised privacy concerns amongst mobile phone users who may need to supply their identity and location information to untrustworthy third ...
Thibault Candebat, Cameron Ross Dunne, David T. Gr...
CSCW
2008
ACM
13 years 10 months ago
Family accounts: a new paradigm for user accounts within the home environment
In this paper we present Family Accounts, a new user account model for shared home computers. We conducted a study with sixteen families, eight who used individual profiles at hom...
Serge Egelman, A. J. Bernheim Brush, Kori M. Inkpe...
JUCS
2008
132views more  JUCS 2008»
13 years 8 months ago
Searching ... in a Web
: Search engines--"web dragons"--are the portals through which we access society's treasure trove of information. They do not publish the algorithms they use to sort...
Ian H. Witten