Sciweavers

1165 search results - page 140 / 233
» Transparent Information Dissemination
Sort
View
ENTCS
2007
112views more  ENTCS 2007»
15 years 4 months ago
A Holistic Approach to Security Policies - Policy Distribution with XACML over COPS
The potentials of modern information technology can only be exploited, if the underlying infrastructure and the applied applications sufficiently take into account all aspects of ...
Jan Peters, Roland Rieke, Taufiq Rochaeli, Bjö...
127
Voted
AIR
2005
102views more  AIR 2005»
15 years 4 months ago
A Case-Based Explanation System for Black-Box Systems
Most users of machine-learning products are reluctant to use the systems without any sense of the underlying logic that has led to the system's predictions. Unfortunately many...
Conor Nugent, Padraig Cunningham
COMPSEC
2000
112views more  COMPSEC 2000»
15 years 4 months ago
Securing The Electronic Market: The KEYSTONE Public Key Infrastructure Architecture
paper, the unified, abstract KEYSTONE Public Key Infrastructure is presented.This architecture consists of a reference model, a functional architecture specification, and a set of ...
Stefanos Gritzalis, Sokratis K. Katsikas, Dimitrio...
PSYCHNOLOGY
2007
96views more  PSYCHNOLOGY 2007»
15 years 4 months ago
A First-time Wireless Internet Connection: More Than Just Clicking on a Link
In the context of understanding the particular use made of nomad Internet and mobile computing in its interactional dimension, this article examines the detail of a first-time con...
Dimitri Voilmy, Karine Lan Hing Ting
CHB
2011
158views more  CHB 2011»
14 years 11 months ago
Factors mediating disclosure in social network sites
In this paper, we explore how privacy settings and privacy policy consumption (reading the privacy policy) affect the relationship between privacy attitudes and disclosure behavio...
Frederic Stutzman, Robert Capra, Jamila Thompson