Sciweavers

8655 search results - page 154 / 1731
» Challenges for Trusted Computing
Sort
View
NDSS
2006
IEEE
15 years 4 months ago
Trust Negotiation with Hidden Credentials, Hidden Policies, and Policy Cycles
In an open environment such as the Internet, the decision to collaborate with a stranger (e.g., by granting access to a resource) is often based on the characteristics (rather tha...
Keith B. Frikken, Jiangtao Li, Mikhail J. Atallah
91
Voted
NSDI
2008
15 years 15 days ago
Ostra: Leveraging Trust to Thwart Unwanted Communication
Online communication media such as email, instant messaging, bulletin boards, voice-over-IP, and social networking sites allow any sender to reach potentially millions of users at...
Alan Mislove, Ansley Post, Peter Druschel, P. Kris...
CHI
2009
ACM
15 years 10 months ago
Real life challenges in access-control management
In this work we ask the question: what are the challenges of managing a physical or file system access-control policy for a large organization? To answer the question, we conducte...
Lujo Bauer, Lorrie Faith Cranor, Robert W. Reeder,...
CHI
2003
ACM
15 years 10 months ago
The challenges of user-centered design and evaluation for infrastructure
Infrastructure software comprises code libraries or runtime processes that support the development or operation of application software. A particular infrastructure system may sup...
W. Keith Edwards, Victoria Bellotti, Anind K. Dey,...
95
Voted
HICSS
2007
IEEE
110views Biometrics» more  HICSS 2007»
15 years 4 months ago
Paper versus Electronic: Challenges Associated with Physicians' Usage of Electronic Medical Records
This study builds on the theory of planned behavior, institutional and diffusion theories to investigate physicians’ attitudes and usage behaviors of electronic medical records ...
Virginia Ilie, James F. Courtney, Craig Van Slyke