Sciweavers

599 search results - page 89 / 120
» Managing Privacy in LBAC Systems
Sort
View
86
Voted
CIKM
2008
Springer
15 years 3 months ago
Mirroring your web presence
This paper describes the starting points of how to design and build tools to help individual users track and monitor their presence on the web from the standpoints of individual p...
Markus Bylund, Jussi Karlgren, Fredrik Olsson, Ped...
CCS
2009
ACM
15 years 8 months ago
A practical property-based bootstrap architecture
Binary attestation, as proposed by the Trusted Computing Group (TCG), is a pragmatic approach for software integrity protection and verification. However, it has also various sho...
René Korthaus, Ahmad-Reza Sadeghi, Christia...
CCS
2007
ACM
15 years 7 months ago
Protecting users from "themselves"
Computer usage and threat models have changed drastically since the advent of access control systems in the 1960s. Instead of multiple users sharing a single file system, each us...
William Enck, Sandra Rueda, Joshua Schiffman, Yoge...
CCS
2010
ACM
15 years 1 months ago
HyperSentry: enabling stealthy in-context measurement of hypervisor integrity
This paper presents HyperSentry, a novel framework to enable integrity measurement of a running hypervisor (or any other highest privileged software layer on a system). Unlike exi...
Ahmed M. Azab, Peng Ning, Zhi Wang, Xuxian Jiang, ...
HICSS
2007
IEEE
195views Biometrics» more  HICSS 2007»
15 years 7 months ago
Digital Relationships in the "MySpace" Generation: Results From a Qualitative Study
A qualitative study was conducted to explore how subjects use social networking sites and instant messenger to engage in interpersonal relationships. The results were used to deve...
Catherine Dwyer