Sciweavers

8655 search results - page 481 / 1731
» Challenges for Trusted Computing
Sort
View
CSE
2009
IEEE
15 years 11 months ago
A Hybrid Enforcement Model for Group-centric Secure Information Sharing
—Group-Centric Secure Information Sharing (g-SIS) is motivated by the need to dynamically share information amongst a set of authorized users for a specific purpose. Authorized ...
Ram Krishnan, Ravi S. Sandhu
NDSS
2009
IEEE
15 years 11 months ago
Document Structure Integrity: A Robust Basis for Cross-site Scripting Defense
Cross-site scripting (or XSS) has been the most dominant class of web vulnerabilities in 2007. The main underlying reason for XSS vulnerabilities is that web markup and client-sid...
Yacin Nadji, Prateek Saxena, Dawn Song
142
Voted
GROUP
2009
ACM
15 years 11 months ago
All My People Right Here, Right Now: management of group co-presence on a social networking site
A mundane but theoretically interesting and practically relevant situation presents itself on social networking sites: the co-presence of multiple groups important to an individua...
Airi Lampinen, Sakari Tamminen, Antti Oulasvirta
MOBIQUITOUS
2008
IEEE
15 years 11 months ago
A study on user acceptance of error visualization techniques
Location-based services in general require information about the position of certain objects. For instance, for a navigation service the position of the user needs to be known. Th...
Hendrik Lemelson, Thomas King, Wolfgang Effelsberg
135
Voted
ACSC
2007
IEEE
15 years 11 months ago
Periodical Payment Model Using Restricted Proxy Certificates
In this paper we shall introduce a new electronic payment concept based on the popular direct debit payment model, entitled periodical payments. The direct debit model currently i...
Grigori Goldman