Sciweavers

408 search results - page 22 / 82
» Tailoring Privacy to Users' Needs
Sort
View
USENIX
2003
13 years 9 months ago
NCryptfs: A Secure and Convenient Cryptographic File System
Often, increased security comes at the expense of user convenience, performance, or compatibility with other systems. The right level of security depends on specific site and use...
Charles P. Wright, Michael C. Martino, Erez Zadok
WECWIS
2000
IEEE
144views ECommerce» more  WECWIS 2000»
14 years 14 days ago
An Architecture to Support Distributed Data Mining Services in E-Commerce Environments
This paper presents our hybrid architectural model for Distributed Data Mining (DDM) which is tailored to meet the needs of e-businesses where application service providers sell D...
Shonali Krishnaswamy, Arkady B. Zaslavsky, Seng Wa...
IAT
2007
IEEE
14 years 2 months ago
Privacy Loss in Classical Multiagent Planning
Privacy is often cited as the main reason to adopt a multiagent approach for a certain problem. This also holds true for multiagent planning. Still, papers on multiagent planning ...
Roman van der Krogt
HICSS
2003
IEEE
186views Biometrics» more  HICSS 2003»
14 years 1 months ago
Personalization through Mask Marketing
Customized marketing, so called 1-to-1 marketing, is often viewed as the panacea of e-commerce. User profiles, such as click streams logging every site the user accesses, are expl...
Moritz Strasser, Alf Zugenmaier
IEEEARES
2007
IEEE
14 years 2 months ago
Context-Dependent Access Control for Contextual Information
Abstract— Following Mark Weiser’s vision of ubiquitous computing and calm technology, computer systems should run in the background, preferably without the user noticing it at ...
Christin Groba, Stephan Grob, Thomas Springer