Sciweavers

116 search results - page 15 / 24
» From Legal Principles to an Internet Voting System
Sort
View
ECOOPW
1999
Springer
15 years 1 months ago
The Role of Trust Management in Distributed Systems Security
Existing authorization mechanisms fail to provide powerful and robust tools for handling security at the scale necessary for today's Internet. These mechanisms are coming unde...
Matt Blaze, Joan Feigenbaum, Angelos D. Keromytis
ESWS
2009
Springer
15 years 4 months ago
Improving Ontology Matching Using Meta-level Learning
Despite serious research efforts, automatic ontology matching still suffers from severe problems with respect to the quality of matching results. Existing matching systems trade-of...
Kai Eckert, Christian Meilicke, Heiner Stuckenschm...
DRMTICS
2005
Springer
15 years 3 months ago
The Australian Sony PlayStation Case: How Far Will Anti-circumvention Law Reach in the Name of DRM?
This chapter overviews the legal issues arising from the modification of the Sony PlayStation console under Australian Copyright Law - the so called anti-circumvention provisions....
Brian Fitzgerald
76
Voted
ACSAC
2000
IEEE
15 years 1 months ago
Less Harm, Less Worry or How to Improve Network Security by Bounding System Offensiveness
In this paper we describe a new class of tools for protecting computer systems from security attacks. Their distinguished feature is the principle they are based on. Host or netwo...
Danilo Bruschi, Lorenzo Cavallaro, Emilia Rosti
MOBISYS
2008
ACM
14 years 11 months ago
Chameleon: a capability adaptation system for interface virtualization
As computing capabilities of embedded devices increase, services such as Internet and multimedia are comportably supported by such devices. Users may demand for migrating services...
Sang-Bum Suh, Xiang Song, Jatin Kumar, Dushmanta M...