Sciweavers

1407 search results - page 165 / 282
» Systems Theory Model for Information Security
Sort
View
CCS
2010
ACM
13 years 8 months ago
A privacy recommendation wizard for users of social networking sites
Privacy is a huge problem for users of social networking sites. While sites like Facebook allow individual users to personalize fine-grained privacy settings, this has proven quit...
Lujun Fang, Heedo Kim, Kristen LeFevre, Aaron Tami
CORR
2011
Springer
196views Education» more  CORR 2011»
13 years 3 days ago
Privacy-Enhanced Reputation-Feedback Methods to Reduce Feedback Extortion in Online Auctions
In this paper, we study methods for improving the utility and privacy of reputation scores for online auctions, such as used in eBay, so as to reduce the effectiveness of feedbac...
Michael T. Goodrich, Florian Kerschbaum
CONTEXT
2007
Springer
14 years 2 months ago
Similarity Measurement in Context
Context plays a crucial role when measuring the similarity of two concepts. Nonetheless, the modelling of context has been mostly neglected in existing similarity measurement theor...
Carsten Keßler
AAAI
2007
13 years 10 months ago
Dominance and Equivalence for Sensor-Based Agents
This paper describes recent results from the robotics community that develop a theory, similar in spirit to the theory of computation, for analyzing sensor-based agent systems. Th...
Jason M. O'Kane, Steven M. LaValle
SACMAT
2003
ACM
14 years 1 months ago
An approach to engineer and enforce context constraints in an RBAC environment
This paper presents an approach that uses special purpose RBAC constraints to base certain access control decisions on context information. In our approach a context constraint is...
Gustaf Neumann, Mark Strembeck