Sciweavers

164 search results - page 23 / 33
» Usable presentation of secure pseudonyms
Sort
View

Publication
148views
13 years 9 months ago
ADSandbox: sandboxing JavaScript to fight malicious websites
We present ADSandbox, an analysis system for malicious websites that focusses on detecting attacks through JavaScript. Since, in contrast to Java, JavaScript does not have any bui...
SOUPS
2006
ACM
14 years 1 months ago
An empirical study of natural language parsing of privacy policy rules using the SPARCLE policy workbench
Today organizations do not have good ways of linking their written privacy policies with the implementation of those policies. To assist organizations in addressing this issue, ou...
Carolyn Brodie, Clare-Marie Karat, John Karat
CHI
2008
ACM
14 years 8 months ago
The Georgia Tech aware home
The Aware Home Research Initiative (AHRI) at Georgia Tech is devoted to the multidisciplinary exploration of emerging technologies and services based in the home. Starting in 1998...
Julie A. Kientz, Shwetak N. Patel, Brian Jones, Ed...
MOBISYS
2007
ACM
14 years 7 months ago
Context-aware access to public shared devices
To allow for an efficient usage of a device in pervasive computing environments, reliable and yet convenient user access is an important requirement. The problem becomes more comp...
David Jea, Ian Yap, Mani B. Srivastava
EUROPAR
2003
Springer
14 years 26 days ago
Short Message Service in a Grid-Enabled Computing Environment
Pervasive computing provides an attractive vision for the future of computing. Mobile computing devices such as mobile phones together with a land-based and wireless communication ...
Fenglian Xu, M. Hakki Eres, Simon J. Cox