Sciweavers

650 search results - page 95 / 130
» Privacy in Non-private Environments
Sort
View
WETICE
1998
IEEE
14 years 27 days ago
The Problem with Multiple Roots in Web Browsers - Certificate Masquerading
Much work is going into securing the public key infrastructure (PKI). Various models for trust exist; Pretty Good Privacy (PGP) and the Progressive-Constraint Trust model are exam...
James M. Hayes
ADMA
2006
Springer
137views Data Mining» more  ADMA 2006»
14 years 12 days ago
SA-IFIM: Incrementally Mining Frequent Itemsets in Update Distorted Databases
Abstract. The issue of maintaining privacy in frequent itemset mining has attracted considerable attentions. In most of those works, only distorted data are available which may bri...
Jinlong Wang, Congfu Xu, Hongwei Dan, Yunhe Pan
HUC
2000
Springer
14 years 7 days ago
Using Handheld Devices in Synchronous Collaborative Scenarios
: In this paper we present a platform specially designed for groupware applications running on handheld devices. Common groupware platforms request desktop computers as underlying ...
Jörg Roth, Claus Unger
MC
2007
13 years 10 months ago
Shifts in Significance: How Group Dynamics Improves Group Awareness
Appropriate awareness support has been an issue in the area of Computer-Supported Cooperative Work (CSCW) for quite a while. Yet, many challenges like the dual trade-off between a...
Christoph Oemig, Tom Gross
ACSW
2003
13 years 10 months ago
Flexible Enterprise Access Control with Object-oriented View Specification
The per-method access control lists of standard middleware technologies allow only simple forms of access control to be expressed and enforced. Given the increasing use of webbase...
Mark Evered