Sciweavers

88 search results - page 2 / 18
» A Comparison of Commercial and Military Computer Security Po...
Sort
View
WWW
2010
ACM
14 years 10 days ago
Alhambra: a system for creating, enforcing, and testing browser security policies
Alhambra is a browser-based system designed to enforce and test web browser security policies. At the core of Alhambra is a policyenhanced browser supporting fine-grain security ...
Shuo Tang, Chris Grier, Onur Aciiçmez, Samu...
CHI
2010
ACM
14 years 6 days ago
Visual vs. compact: a comparison of privacy policy interfaces
In this paper, we compare the impact of two different privacy policy representations – AudienceView and Expandable Grids – on users modifying privacy policies for a social net...
Heather Richter Lipford, Jason Watson, Michael Whi...
POLICY
2004
Springer
13 years 10 months ago
Policy-Based Mobile Ad Hoc Network Management
Ad hoc networking is the basis of the future military network-centric warfare architecture. Such networks are highly dynamic in nature, as mobile ad hoc networks are formed over w...
Ritu Chadha, Hong Cheng, Yuu-Heng Cheng, Cho-Yu Ja...
CCS
2006
ACM
13 years 9 months ago
Secure information sharing enabled by Trusted Computing and PEI models
The central goal of secure information sharing is to "share but protect" where the motivation to "protect" is to safeguard the sensitive content from unauthori...
Ravi S. Sandhu, Kumar Ranganathan, Xinwen Zhang
ACMSE
2008
ACM
13 years 7 months ago
Biometrics education with hands-on labs
Biometrics is an emerging field via the automated use of unique and measurable physiological or behavioral characteristics to determine or verify identity. Biometrics has a variet...
Li Yang, Kathy Winters, Joseph M. Kizza