Sciweavers

830 search results - page 128 / 166
» Owned Policies for Information Security
Sort
View
HICSS
2009
IEEE
108views Biometrics» more  HICSS 2009»
15 years 6 months ago
Virtual Networks and Ethics: An Empirical Research in a Non-Governmental Organization
– This paper analyzes the opportunities offered by information and communication technologies (ICTs) and the related ethical issues they raise within the transparency practices of...
Antonino Vaccaro, Peter Madsen
ACISICIS
2007
IEEE
15 years 6 months ago
Trust Realisation in Multi-domain Collaborative Environments
In the Internet-age, the geographical boundaries that have previously impinged upon inter-organisational collaborations have become decreasingly important. Of more importance for ...
Oluwafemi Ajayi, Richard O. Sinnott, Anthony Stell
SASN
2006
ACM
15 years 5 months ago
Inverting sensor networks and actuating the environment for spatio-temporal access control
Wireless sensor networks are typically deployed to measure the information field, rather than create an information field. However, by utilizing the radio on sensor nodes, it is...
Shu Chen, Yu Zhang, Wade Trappe
SIGCOMM
2009
ACM
15 years 6 months ago
Virtual individual servers as privacy-preserving proxies for mobile devices
People increasingly generate content on their mobile devices and upload it to third-party services such as Facebook and Google Latitude for sharing and backup purposes. Although t...
Ramón Cáceres, Landon P. Cox, Harold...
SIGUCCS
2000
ACM
15 years 3 months ago
Windows 2000 Deployment Technical Challenges at the University of Colorado at Boulder
Microsoft Windows 2000 represents a major change in desktop and network operating systems. This latest Windows operating system includes many new features and technologies that wi...
Brad Judy, Alfred Roberts, David Bodnar