Sciweavers

344 search results - page 56 / 69
» trust 2009
Sort
View
SACMAT
2009
ACM
14 years 3 months ago
A semantic web based framework for social network access control
The existence of on-line social networks that include person specific information creates interesting opportunities for various applications ranging from marketing to community o...
Barbara Carminati, Elena Ferrari, Raymond Heatherl...
SOUPS
2009
ACM
14 years 3 months ago
Serial hook-ups: a comparative usability study of secure device pairing methods
Secure Device Pairing is the bootstrapping of secure communication between two previously unassociated devices over a wireless channel. The human-imperceptible nature of wireless ...
Alfred Kobsa, Rahim Sonawalla, Gene Tsudik, Ersin ...
COMPSAC
2009
IEEE
14 years 1 months ago
ELALPS: A Framework to Eliminate Location Anonymizer from Location Privacy Systems
—Countless challenges to preserving a user’s location privacy exist and have become more important than ever before with the proliferation of handheld devices and the pervasive...
Mehrab Monjur, Sheikh Iqbal Ahamed, Chowdhury Shar...
SAC
2009
ACM
14 years 1 months ago
A taxonomy and adversarial model for attacks against network log anonymization
In recent years, it has become important for researchers, security incident responders and educators to share network logs, and many log anonymization tools and techniques have be...
Justin King, Kiran Lakkaraju, Adam J. Slagell
AIED
2009
Springer
14 years 1 months ago
Towards Automatic Assessment for Project Based Learning Groups
Project course instructors routinely perform their formal assessments based on impressions formed from their mostly indirect experience with the groups they oversee. Nevertheless, ...
Gahgene Gweon, Rohit Kumar, Soojin Jun, Carolyn Pe...