Sciweavers

408 search results - page 36 / 82
» Tailoring Privacy to Users' Needs
Sort
View
MDM
2009
Springer
141views Communications» more  MDM 2009»
14 years 2 months ago
Constructing Hierarchical Representations of Indoor Spaces
Indoor spaces pose many challenges for spatial information systems, amongst them appropriate spatial communication. Compared to typical outdoor spaces, indoor spaces are clustered...
Kai-Florian Richter, Stephan Winter, Urs-Jakob R&u...
EGOV
2007
Springer
14 years 2 months ago
Reference Models for E-Services Integration Based on Life-Events
Modelling life events is a task of a crucial importance and a first necessary step towards supporting resolution of a particular life event on the active e-government portal. The u...
Ljupco Todorovski, Mateja Kunstelj, Mirko Vintar
ICMCS
1999
IEEE
106views Multimedia» more  ICMCS 1999»
14 years 10 days ago
Integrating Support for Collaboration-Unaware VRML Models into Cooperative Applications
This paper presents design and architecture of the distributed virtual reality service (dvr) which allows collaboration-unaware VRML animations and simulations to be integrated in...
Werner Geyer, Martin Mauve
ESORICS
2007
Springer
14 years 2 months ago
Incorporating Temporal Capabilities in Existing Key Management Schemes
The problem of key management in access hierarchies studies ways to assign keys to users and classes such that each user, after receiving her secret key(s), is able to independentl...
Mikhail J. Atallah, Marina Blanton, Keith B. Frikk...
CHIMIT
2007
ACM
14 years 1 days ago
Looking for trouble: understanding end-user security management
End users are often cast as the weak link in computer security; they fall victim to social engineering and tend to know very little about security technology and policies. This pa...
Joshua B. Gross, Mary Beth Rosson