Sciweavers

15379 search results - page 25 / 3076
» Protecting users from
Sort
View
WISEC
2010
ACM
13 years 7 months ago
Mobile user location-specific encryption (MULE): using your office as your password
Data breaches due to stolen laptops are a major problem. Solutions exist to secure sensitive files on laptops, but are rarely deployed because users view them as inconvenient. Thi...
Ahren Studer, Adrian Perrig
AMR
2006
Springer
119views Multimedia» more  AMR 2006»
13 years 9 months ago
The Potential of User Feedback Through the Iterative Refining of Queries in an Image Retrieval System
Inaccurate or ambiguous expressions in queries lead to poor results in information retrieval. We assume that iterative user feedback can improve the quality of queries. To this end...
Maher Ben Moussa, Marco Pasch, Djoerd Hiemstra, Pa...
IPM
2010
133views more  IPM 2010»
13 years 6 months ago
A concept-relationship acquisition and inference approach for hierarchical taxonomy construction from tags
Taxonomy construction is a resource-demanding, top down, and time consuming effort. It does not always cater for the prevailing context of the captured information. This paper pro...
Eric Tsui, W. M. Wang, Chi Fai Cheung, Adela S. M....
CCS
2008
ACM
13 years 9 months ago
Controlled privacy preserving keyword search
Data sharing on public servers has become a popular service on the Internet, in which users can store and share data with other users through public servers. However, because the ...
Stephen S. Yau, Yin Yin
JSW
2007
124views more  JSW 2007»
13 years 7 months ago
Shibboleth as a Tool for Authorized Access Control to the Subversion Repository System
—Shibboleth is an architecture and protocol for allowing users to authenticate and be authorized to use a remote resource by logging into the identity management system that is m...
Linh Ngo, Amy W. Apon