Sciweavers

7 search results - page 1 / 2
» Ethical Guidelines for Computer Security Researchers:
Sort
View
CHI
1995
ACM
13 years 8 months ago
Ethics, Lies and Videotape..
Videotape has become one of the CHI community's most useful technologies: it allows us to analyze users' interactions with computers, prototype new interfaces, and prese...
Wendy E. Mackay
NSDI
2008
13 years 7 months ago
Conducting Cybersecurity Research Legally and Ethically
The primary legal obstacles to conducting cybersecurity are not outright prohibitions but rather the difficulty of determining which of a large set of complex statutes might regul...
Aaron J. Burstein
IEEESP
2010
92views more  IEEESP 2010»
13 years 2 months ago
Ethics in Security Vulnerability Research
Andrea M. Matwyshyn, Ang Cui, Angelos D. Keromytis...
MA
2001
Springer
175views Communications» more  MA 2001»
13 years 9 months ago
Evaluating the Security of Three Java-Based Mobile Agent Systems
Abstract. The goal of mobile agent systems is to provide a distributed computing infrastructure supporting applications whose components can move between different execution enviro...
Sebastian Fischmeister, Giovanni Vigna, Richard A....