Sciweavers

68 search results - page 11 / 14
» Internet users' perceptions of 'privacy concerns' and 'priva...
Sort
View
92
Voted
ICNP
2007
IEEE
15 years 6 months ago
Design and Implementation of Cross-Domain Cooperative Firewall
Security and privacy are two major concerns in supporting roaming users across administrative domains. In current practices, a roaming user often uses encrypted tunnels, e.g., Virt...
Jerry Cheng, Hao Yang, Starsky H. Y. Wong, Petros ...
83
Voted
SP
2007
IEEE
110views Security Privacy» more  SP 2007»
15 years 5 months ago
A Systematic Approach to Uncover Security Flaws in GUI Logic
To achieve end-to-end security, traditional machine-to-machine security measures are insufficient if the integrity of the human-computer interface is compromised. GUI logic flaws ...
José Meseguer, Ralf Sasse, Helen J. Wang, Y...
106
Voted
ACSAC
1998
IEEE
15 years 3 months ago
Detecting Anomalous and Unknown Intrusions Against Programs
The ubiquity of the Internet connection to desktops has been both boon to business as well as cause for concern for the security of digital assets that may be unknowingly exposed....
Anup K. Gosh, James Wanken, Frank Charron
87
Voted
OOPSLA
1998
Springer
15 years 3 months ago
JRes: A Resource Accounting Interface for Java
With the spread of the Internet the computing model on server systems is undergoing several important changes. Recent research ideas concerning dynamic operating system extensibil...
Grzegorz Czajkowski, Thorsten von Eicken
CSCW
2002
ACM
14 years 11 months ago
Who can claim complete abstinence from peeking at print jobs?
While systems supporting communities of practice in work organizations have been shown to be desirable many, if not all, are decoupled from daily work practices and tools. This hi...
Antonietta Grasso, Jean-Luc Meunier