Sciweavers

1117 search results - page 195 / 224
» A Compliance Model of Trust
Sort
View
PKC
2009
Springer
121views Cryptology» more  PKC 2009»
15 years 10 months ago
On the Theory and Practice of Personal Digital Signatures
We take a step towards a more realistic modeling of personal digital signatures, where a human user, his mobile equipment, his PC and a server are all considered as independent pla...
Gert Læssøe Mikkelsen, Ivan Damg&arin...
CHI
2008
ACM
15 years 10 months ago
The effects of semantic grouping on visual search
This paper reports on work-in-progress to better understand how users visually interact with hierarchically organized semantic information. Experimental reaction time and eye move...
Tim Halverson, Anthony J. Hornof
ICSE
2007
IEEE-ACM
15 years 10 months ago
The CRUTIAL Architecture for Critical Information Infrastructures
Abstract. In this chapter we discuss the susceptibility of critical information infrastructures to computer-borne attacks and faults, mainly due to their largely computerized natur...
Paulo Veríssimo, Nuno Ferreira Neves, Migue...
CSCW
2010
ACM
15 years 6 months ago
Perceptions of trustworthiness online: the role of visual and textual information
People increasingly rely on social networking websites to initiate personal and professional relationships. This requires that a considerable amount of trust be placed in stranger...
Catalina L. Toma
HICSS
2009
IEEE
209views Biometrics» more  HICSS 2009»
15 years 4 months ago
SIDD: A Framework for Detecting Sensitive Data Exfiltration by an Insider Attack
Detecting and mitigating insider threat is a critical element in the overall information protection strategy. By successfully implementing tactics to detect this threat, organizat...
Yali Liu, Cherita L. Corbett, Ken Chiang, Rennie A...