Sciweavers

2927 search results - page 37 / 586
» Secure Distributed Human Computation
Sort
View
CCS
2004
ACM
15 years 8 months ago
KNOW Why your access was denied: regulating feedback for usable security
We examine the problem of providing useful feedback about access control decisions to users while controlling the disclosure of the system’s security policies. Relevant feedback...
Apu Kapadia, Geetanjali Sampemane, Roy H. Campbell
117
Voted
IPPS
1999
IEEE
15 years 6 months ago
An Approach for Measuring IP Security Performance in a Distributed Environment
Abstract. The Navy needs to use Multi Level Security (MLS) techniques in an environment with increasing amount of real time computation brought about by increased automation requir...
Brett L. Chappell, David T. Marlow, Philip M. Irey...
110
Voted
MIDDLEWARE
2007
Springer
15 years 8 months ago
Security issues with the IP multimedia subsystem (IMS)
Michael T. Hunter, Russell J. Clark, Frank S. Park
89
Voted
EDOC
2006
IEEE
15 years 8 months ago
Information Security Guidance for Enterprise Transformation
John A. Anderson, Vijaykumar Rachamadugu