Sciweavers

348 search results - page 46 / 70
» Secure Computation on the Web: Computing without Simultaneou...
Sort
View
CCS
2005
ACM
15 years 7 months ago
A framework for concrete reputation-systems with applications to history-based access control
In a reputation-based trust-management system, agents maintain information about the past behaviour of other agents. This information is used to guide future trust-based decisions...
Karl Krukow, Mogens Nielsen, Vladimiro Sassone
SAC
2006
ACM
15 years 7 months ago
Noxes: a client-side solution for mitigating cross-site scripting attacks
Web applications are becoming the dominant way to provide access to on-line services. At the same time, web application vulnerabilities are being discovered and disclosed at an al...
Engin Kirda, Christopher Krügel, Giovanni Vig...
TGC
2005
Springer
15 years 7 months ago
Concurrency Among Strangers
Programmers write programs, expressing plans for machines to execute. When composed so that they may cooperate, plans may instead interfere with each other in unanticipated ways. P...
Mark S. Miller, Eric Dean Tribble, Jonathan S. Sha...
HCI
2009
14 years 11 months ago
Social-Technical Tools for Collaborative Sensemaking and Sketching
Sensemaking is a deliberate effort to understand events or information, and a sketch is an exploratory graphic composition of a concept or observation. Within the architecture doma...
James Sullivan, Meredith Banasiak, Christopher Mes...
122
Voted
CHI
2011
ACM
14 years 5 months ago
Oops, I did it again: mitigating repeated access control errors on facebook
We performed a study of Facebook users to examine how they coped with limitations of the Facebook privacy settings interface. Students graduating and joining the workforce create ...
Serge Egelman, Andrew Oates, Shriram Krishnamurthi