Sciweavers

408 search results - page 23 / 82
» Tailoring Privacy to Users' Needs
Sort
View
SOUPS
2010
ACM
13 years 12 months ago
Encountering stronger password requirements: user attitudes and behaviors
Text-based passwords are still the most commonly used authentication mechanism in information systems. We took advantage of a unique opportunity presented by a significant change...
Richard Shay, Saranga Komanduri, Patrick Gage Kell...
CCS
2010
ACM
14 years 2 months ago
Toward practical authorization-dependent user obligation systems
Many authorization system models include some notion of obligation. Little attention has been given to user obligations that depend on and affect authorizations. However, to be u...
Murillo Pontual, Omar Chowdhury, William H. Winsbo...
IEEEARES
2007
IEEE
14 years 2 months ago
Supporting Compliant and Secure User Handling - A Structured Approach for In-House Identity Management
The catchword “compliance” dominates the actual debate about Identity Management and information security like few before. Companies need to comply with a variety of internal ...
Ludwig Fuchs, Günther Pernul
EDBTW
2010
Springer
14 years 2 months ago
A practice-oriented framework for measuring privacy and utility in data sanitization systems
Published data is prone to privacy attacks. Sanitization methods aim to prevent these attacks while maintaining usefulness of the data for legitimate users. Quantifying the trade-...
Michal Sramka, Reihaneh Safavi-Naini, Jörg De...
ACL
2008
13 years 9 months ago
SIDE: The Summarization Integrated Development Environment
In this type-II demo, we introduce SIDE1 (the Summarization Integrated Development Environment), an infrastructure that facilitates construction of summaries tailored to the needs...
Moonyoung Kang, Sourish Chaudhuri, Mahesh Joshi, C...