Sciweavers

422 search results - page 67 / 85
» Risk management for distributed authorization
Sort
View
CN
2007
172views more  CN 2007»
15 years 20 days ago
Threshold cryptography in P2P and MANETs: The case of access control
Ad hoc groups, such as peer-to-peer (P2P) systems and mobile ad hoc networks (MANETs) represent recent technological advancements. They support low-cost, scalable and fault-tolera...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
IJEB
2007
127views more  IJEB 2007»
15 years 18 days ago
Factors mediating the routinisation of e-learning within a traditional university education environment
Technology-enhanced or Computer Aided Learning (e-learning) can be institutionally integrated and supported by learning management systems or Virtual Learning Environments (VLEs) ...
Shafqat Hameed, John Mellor, Atta Badii, Niyati Pa...
83
Voted
COMPUTER
2004
120views more  COMPUTER 2004»
15 years 16 days ago
Computer Security in the Real World
After thirty years of work on computer security, why are almost all the systems in service today extremely vulnerable to attack? The main reason is that security is expensive to s...
Butler W. Lampson
115
Voted
ISR
2011
14 years 3 months ago
Compatibility and Proprietary Standards: The Impact of Conversion Technologies in IT Markets with Network Effects
e from http://ssrn.com/abstract=980726 Acknowledgements: The authors thank Ramayya Krishnan, Marshall Van Alstyne, Senior Editor Sanjeev Dewan, the associate editor and referees fo...
Charles Zhechao Liu, Esther Gal-Or, Chris F. Kemer...
CSCW
2012
ACM
13 years 8 months ago
Social coding in GitHub: transparency and collaboration in an open software repository
Social applications on the web let users track and follow the activities of a large number of others regardless of location or affiliation. There is a potential for this transpare...
Laura A. Dabbish, H. Colleen Stuart, Jason Tsay, J...