Sciweavers

7 search results - page 1 / 2
» Ethical Guidelines for Computer Security Researchers:
Sort
View
CHI
1995
ACM
13 years 9 months ago
Ethics, Lies and Videotape..
Videotape has become one of the CHI community's most useful technologies: it allows us to analyze users' interactions with computers, prototype new interfaces, and prese...
Wendy E. Mackay
NSDI
2008
13 years 8 months ago
Conducting Cybersecurity Research Legally and Ethically
The primary legal obstacles to conducting cybersecurity are not outright prohibitions but rather the difficulty of determining which of a large set of complex statutes might regul...
Aaron J. Burstein
IEEESP
2010
92views more  IEEESP 2010»
13 years 3 months ago
Ethics in Security Vulnerability Research
Andrea M. Matwyshyn, Ang Cui, Angelos D. Keromytis...
MA
2001
Springer
175views Communications» more  MA 2001»
13 years 10 months ago
Evaluating the Security of Three Java-Based Mobile Agent Systems
Abstract. The goal of mobile agent systems is to provide a distributed computing infrastructure supporting applications whose components can move between different execution enviro...
Sebastian Fischmeister, Giovanni Vigna, Richard A....