Sciweavers

635 search results - page 12 / 127
» Social Aspects of Information Security
Sort
View
IPAW
2010
13 years 5 months ago
Social Web-Scale Provenance in the Cloud
One of the biggest effects of Web 2.0 and the evolution of the social Web is the commoditization of data. The emergence of applications such as Facebook and Twitter, have lowered t...
Yogesh Simmhan, Karthik Gomadam
CSE
2009
IEEE
14 years 2 months ago
A Visual Interface for Social Information Filtering
Abstract—Collaborative or “Social” filtering has been successfully deployed over the years as a technique for analysing large amounts of user-preference knowledge to predict...
John O'Donovan, Brynjar Gretarsson, Svetlin Bostan...
ARESEC
2011
110views more  ARESEC 2011»
12 years 7 months ago
ACON: Activity-Centric Access Control for Social Computing
—With increasing amount of sensitive user data stored in social computing systems (SCSs) and lack of consensus on how it should be protected under meaningful control by the avera...
Jaehong Park, Ravi S. Sandhu, Yuan Cheng
CSE
2009
IEEE
13 years 8 months ago
Social Relationship Identification: An Example of Social Query
Every moment, millions of people worldwide are communicating and sharing content online. We express ourselves online to enrich existing relationships and establish new relationship...
Christopher P. Diehl, Jaime Montemayor, Michael Pe...
CAISE
2005
Springer
14 years 26 days ago
Ontological Modelling of Information Systems from Bunge's Contributions
The aim of this paper is to determine aspects to be considered in Bunge’s ontological models in order to obtain an Integrated Ontological Model of Information Systems (IOMIS). Th...
Susana I. Herrera, Diana Pallioto, Gregorio N. Tka...