Sciweavers

3299 search results - page 106 / 660
» Privacy and Trusted Computing
Sort
View
CHI
2004
ACM
16 years 4 months ago
Privacy policies as decision-making tools: an evaluation of online privacy notices
Studies have repeatedly shown that users are increasingly concerned about their privacy when they go online. In response to both public interest and regulatory pressures, privacy ...
Carlos Jensen, Colin Potts
NSPW
2004
ACM
15 years 10 months ago
Symmetric behavior-based trust: a new paradigm for internet computing
Current models of Internet Computing are highly asymmetric – a host protects itself from malicious mobile Java programs, but there is no way to get assurances about the behavior...
Vivek Haldar, Michael Franz
FIMH
2007
Springer
15 years 10 months ago
Can We Trust the Transgenic Mouse? Insights from Computer Simulations
Abstract. Over the past several decades, the mouse has gained prominence in the cardiac electrophysiology literature as the animal model of choice. Using computer models of the mou...
Joseph Tranquillo, Adhira Sunkara
ITRUST
2005
Springer
15 years 10 months ago
Towards an Evaluation Methodology for Computational Trust Systems
Ciarán Bryce, Nathan Dimmock, Karl Krukow, ...