Sciweavers

63 search results - page 13 / 13
» Multiagent Policy Architecture for Virtual Business Organiza...
Sort
View
IEEESP
2007
98views more  IEEESP 2007»
13 years 4 months ago
Educating Students to Create Trustworthy Systems
igh level of abstraction and to provide broad oversight. In contrast, the goal of computer science security education is to provide the technicalexpertisetodevelopsecure software a...
Richard S. Swart, Robert F. Erbacher
JUCS
2008
118views more  JUCS 2008»
13 years 4 months ago
Enhancements of Meeting Information Management and Application for Knowledge Access and Learning Activities
: Communication processes have become increasingly important in modern working life. Organizations invest a surprisingly high amount of financial resources and employee work time i...
Christian Gütl
IDTRUST
2009
ACM
13 years 11 months ago
Usable trust anchor management
Security in browsers is based upon users trusting a set of root Certificate Authorities (called Trust Anchors) which they may know little or nothing about. Browser vendors face a...
Massimiliano Pala, Scott A. Rea