Sciweavers

408 search results - page 32 / 82
» Tailoring Privacy to Users' Needs
Sort
View
HT
2007
ACM
13 years 12 months ago
User-tailored web accessibility evaluations
This paper presents a framework and system to evaluate the accessibility of web pages according to the individual requirements of users with disabilities. These requirements not o...
Markel Vigo, Alfred Kobsa, Myriam Arrue, Julio Aba...
ACSAC
2000
IEEE
14 years 14 days ago
Usability Meets Security -The Identity-Manager as Your Personal Security Assistant for the Internet
In today’s applications, most users disregard the security functionality. They do not have the knowledge and/or the motivation to configure or to use the existing security func...
Uwe Jendricke, Daniela Gerd tom Markotten
ACSAC
1999
IEEE
14 years 11 days ago
Application-Level Isolation Using Data Inconsistency Detection
Recently, application-level isolation was introduced as an effective means of containing the damage that a suspicious user could inflict on data. In most cases, only a subset of t...
Amgad Fayad, Sushil Jajodia, Catherine D. McCollum
PDP
2008
IEEE
14 years 2 months ago
CoDaMine: Communication Data Mining for Feedback and Control in Ubiquitous Environments
In ubiquitous environments an increasing number of sensors capture information on users and an increasing number of actuators present information to users. In this paper we presen...
Tom Gross, Mirko Fetter
KBSE
2007
IEEE
14 years 2 months ago
Iterative model-driven development of adaptable service-based applications
Flexibility and interoperability make web services well suited for designing highly-customizable reactive service-based applications, that is interactive applications that can be ...
Leen Lambers, Hartmut Ehrig, Leonardo Mariani, Mau...