Sciweavers

2927 search results - page 3 / 586
» Secure Distributed Human Computation
Sort
View
IFIP
1992
Springer
13 years 9 months ago
Human Factors In Computer Security
Ibibia Dabipi, Husam Yaghi, Issam Qasem
ATAL
2011
Springer
12 years 5 months ago
Improved computational models of human behavior in security games
Rong Yang, Christopher Kiekintveld, Fernando Ord&o...
XMLSEC
2003
ACM
13 years 11 months ago
First experiences using XACML for access control in distributed systems
Authorization systems today are increasingly complex. They span domains of administration, rely on many different authentication sources, and manage permissions that can be as com...
Markus Lorch, Seth Proctor, Rebekah Lepro, Dennis ...
CCS
2009
ACM
14 years 17 days ago
Privacy-preserving genomic computation through program specialization
In this paper, we present a new approach to performing important classes of genomic computations (e.g., search for homologous genes) that makes a significant step towards privacy...
Rui Wang, XiaoFeng Wang, Zhou Li, Haixu Tang, Mich...