Sciweavers

8655 search results - page 198 / 1731
» Challenges for Trusted Computing
Sort
View
ETS
2002
IEEE
153views Hardware» more  ETS 2002»
14 years 10 months ago
Overcoming Social and Psychological Barriers to Effective On-line Collaboration
Research suggests that collaboration in an on-line course can enhance learning, reduce feelings of isolation, increase satisfaction with the course, and increase motivation. Unfor...
Sandra C. Hughes, Leah Wickersham, David L. Ryan-J...
TRUST
2009
Springer
15 years 5 months ago
Securing the Dissemination of Emergency Response Data with an Integrated Hardware-Software Architecture
During many crises, access to sensitive emergency-support information is required to save lives and property. For example, for effective evacuations first responders need the name...
Timothy E. Levin, Jeffrey S. Dwoskin, Ganesha Bhas...
IEEESCC
2008
IEEE
15 years 5 months ago
A Secure Information Flow Architecture for Web Services
Current web service platforms (WSPs) often perform all web services-related processing, including securitysensitive information handling, in the same protection domain. Consequent...
Lenin Singaravelu, Jinpeng Wei, Calton Pu
ACSAC
2001
IEEE
15 years 2 months ago
Securing Web Servers against Insider Attack
Too often, "security of Web transactions" reduces to "encryption of the channel"--and neglects to address what happens at the server on the other end. This ove...
Shan Jiang, Sean W. Smith, Kazuhiro Minami
SAC
2006
ACM
15 years 4 months ago
Trust-decisions on the base of maximal information of recommended direct-trust
Nowadays the concept of trust in computer communications starts to get more and more popular. While the idea of trust in human interaction seems to be obvious and understandable i...
Uwe Roth, Volker Fusenig