Sciweavers

448 search results - page 63 / 90
» Who is in Control
Sort
View
94
Voted
NSDI
2007
15 years 6 months ago
TightLip: Keeping Applications from Spilling the Beans
Access control misconfigurations are widespread and can result in damaging breaches of confidentiality. This paper presents TightLip, a privacy management system that helps user...
Aydan R. Yumerefendi, Benjamin Mickle, Landon P. C...
ACMIDC
2008
15 years 5 months ago
PointAssist: helping four year olds point with ease
Children's difficulty in point-and-click tasks using indirect pointing devices such as the mouse has been documented in several studies. This difficulty is manifested in a la...
Juan Pablo Hourcade, Keith B. Perry, Aditya Sharma
125
Voted
KESAMSTA
2010
Springer
15 years 5 months ago
Modelling Dynamic Forgetting in Distributed Information Systems
Abstract. We describe and model a new aspect in the design of distributed information systems. We build upon a previously described problem on the microlevel, which asks how quickl...
Nicolas Höning, Martijn C. Schut
150
Voted
ATAL
2007
Springer
15 years 5 months ago
InterPol: a policy framework for managing trust and privacy in referral networks
Referral networks are a kind of P2P system consisting of autonomous agents who seek, provide services, or refer other service providers. Key applications include service discovery...
Yathiraj B. Udupi, Munindar P. Singh
132
Voted
IFIP13
2004
15 years 5 months ago
Toward A Human-Centered UML For Risk Analysis
: Safety is now a major concern in many complex systems such as medical robots. A way to control the complexity of such systems is to manage risk. The first and important step of t...
Jérémie Guiochet, Gilles Motet, Clau...