Sciweavers

937 search results - page 6 / 188
» The Social Side of Services
Sort
View
ETRICS
2006
14 years 2 months ago
Policy-Based Integration of User and Provider-Sided Identity Management
Abstract. Depending on whether the users or the providers are performing it, Identity Management (IM) traditionally has different meanings. For users, IM means to choose between on...
Wolfgang Hommel
ASWC
2006
Springer
14 years 2 months ago
Community Focused Social Network Extraction
Abstract. A social networking service can become the basis for the information infrastructure of the future. For that purpose, it is important to extract social networks that refle...
Masahiro Hamasaki, Yutaka Matsuo, Keisuke Ishida, ...
ARESEC
2011
110views more  ARESEC 2011»
12 years 11 months ago
ACON: Activity-Centric Access Control for Social Computing
—With increasing amount of sensitive user data stored in social computing systems (SCSs) and lack of consensus on how it should be protected under meaningful control by the avera...
Jaehong Park, Ravi S. Sandhu, Yuan Cheng
MIDDLEWARE
2010
Springer
13 years 9 months ago
Prometheus: User-Controlled P2P Social Data Management for Socially-Aware Applications
Recent Internet applications, such as online social networks and user-generated content sharing, produce an unprecedented amount of social information, which is further augmented b...
Nicolas Kourtellis, Joshua Finnis, Paul Anderson, ...
ICCSA
2004
Springer
14 years 4 months ago
A Study on Smart Card Security Evaluation Criteria for Side Channel Attacks
In the course of making electronic services and facilities more widely accessible and usable, more and more IT systems are incorporating smart cards as a component. We analyzes the...
Hoon Jae Lee, ManKi Ahn, Seongan Lim, Sang-Jae Moo...