Sciweavers

712 search results - page 42 / 143
» Secure Data Management in Trusted Computing
Sort
View
MOBISYS
2007
ACM
14 years 8 months ago
SmokeScreen: flexible privacy controls for presence-sharing
Presence-sharing is an emerging platform for mobile applications, but presence-privacy remains a challenge. Privacy controls must be flexible enough to allow sharing between both ...
Landon P. Cox, Angela Dalton, Varun Marupadi
COOPIS
2004
IEEE
14 years 24 days ago
Trust-Aware Collaborative Filtering for Recommender Systems
Recommender Systems allow people to find the resources they need by making use of the experiences and opinions of their nearest neighbours. Costly annotations by experts are replac...
Paolo Massa, Paolo Avesani
CHIMIT
2007
ACM
14 years 1 months ago
Looking for trouble: understanding end-user security management
End users are often cast as the weak link in computer security; they fall victim to social engineering and tend to know very little about security technology and policies. This pa...
Joshua B. Gross, Mary Beth Rosson
ACMICEC
2003
ACM
144views ECommerce» more  ACMICEC 2003»
14 years 2 months ago
Security model for a multi-agent marketplace
A multi-agent marketplace, MAGNET (Multi AGent Negotiation Testbed), is a promising solution to conduct online combinatorial auctions. The trust model of MAGNET is somewhat diffe...
Ashutosh Jaiswal, Yongdae Kim, Maria L. Gini
VLDB
2004
ACM
147views Database» more  VLDB 2004»
14 years 2 months ago
Client-Based Access Control Management for XML documents
The erosion of trust put in traditional database servers and in Database Service Providers, the growing interest for different forms of data dissemination and the concern for prot...
Luc Bouganim, François Dang Ngoc, Philippe ...