Sciweavers

3544 search results - page 452 / 709
» Information Security in Open Systems
Sort
View
FC
1997
Springer
107views Cryptology» more  FC 1997»
15 years 3 months ago
An Efficient Micropayment System Based on Probabilistic Polling
Existing software proposals for electronic payments can be divided into "on-line" schemes that require participation of a trusted party (the bank) in every transaction an...
Stanislaw Jarecki, Andrew M. Odlyzko
CIKM
2010
Springer
14 years 10 months ago
Choosing your own adventure: automatic taxonomy generation to permit many paths
A taxonomy organizes concepts or topics in a hierarchical structure and can be created manually or via automated systems. A major drawback of taxonomies is that they require users...
Xiaoguang Qi, Dawei Yin, Zhenzhen Xue, Brian D. Da...
WOWMOM
2005
ACM
133views Multimedia» more  WOWMOM 2005»
15 years 5 months ago
A Statistical Matching Approach to Detect Privacy Violation for Trust-Based Collaborations
Distributed trust and reputation management mechanisms are often proposed as a means of providing assurance in dynamic and open environments by enabling principals to building up ...
Mohamed Ahmed, Daniele Quercia, Stephen Hailes
CSCW
2008
ACM
15 years 28 days ago
Imprint, a community visualization of printer data: designing for open-ended engagement on sustainability
We introduce Imprint, a casual information visualization kiosk that displays data extracted from a printer queue. We designed the system to be open-ended, and to support a workgro...
Zachary Pousman, Hafez Rouzati, John T. Stasko
CCS
2009
ACM
16 years 13 days ago
Logging key assurance indicators in business processes
Management of a modern enterprise is based on the assumption that executive reports of lower-layer management are faithful to what is actually happening in the field. As some well...
Fabio Massacci, Gene Tsudik, Artsiom Yautsiukhin