Sciweavers

164 search results - page 8 / 33
» A Case (Study) For Usability in Secure Email Communication
Sort
View
INFOCOM
2006
IEEE
15 years 3 months ago
Supporting Secure Communication and Data Collection in Mobile Sensor Networks
— Sensor deployments may be static, but researchers have recently been making a case for mobile collector nodes to enhance data acquisition. Since mobile nodes are often more pri...
Li Zhou, Jinfeng Ni, Chinya V. Ravishankar
74
Voted
PERCOM
2009
ACM
15 years 10 months ago
Caveat Emptor: A Comparative Study of Secure Device Pairing Methods
Abstract--"Secure Device Pairing" is the process of bootstrapping a secure channel between two previously unassociated devices over a (usually wireless) human-imperceptib...
Arun Kumar, Nitesh Saxena, Gene Tsudik, Ersin Uzun
HICSS
2002
IEEE
68views Biometrics» more  HICSS 2002»
15 years 2 months ago
Framing Virtual Interactivity between Government and Citizens: A Study of Feedback Systems in the Chicago Police Department
This paper considers the current efforts to describe the effect of Internet-based technology on interactivity between citizens and public organizations to be incomplete and poorly...
Shelley Fulla, Eric W. Welch
SACMAT
2003
ACM
15 years 2 months ago
The role control center: features and case studies
Role-based Access Control (RBAC) models have been implemented not only in self-contained resource management products such as DBMSs and Operating Systems but also in a class of pr...
David F. Ferraiolo, Ramaswamy Chandramouli, Gail-J...
SP
2010
IEEE
157views Security Privacy» more  SP 2010»
15 years 1 months ago
Bootstrapping Trust in Commodity Computers
Trusting a computer for a security-sensitive task (such as checking email or banking online) requires the user to know something about the computer’s state. We examine research ...
Bryan Parno, Jonathan M. McCune, Adrian Perrig