Sciweavers

12478 search results - page 327 / 2496
» Secure Interaction Design
Sort
View
CHI
2008
ACM
16 years 5 months ago
Access control by testing for shared knowledge
Controlling the privacy of online content is difficult and often confusing. We present a social access control where users devise simple questions of shared knowledge instead of c...
Michael Toomim, Xianhang Zhang, James Fogarty, Jam...
AGENTS
2000
Springer
15 years 9 months ago
Air traffic control and alert agent
This paper presents an agent program that monitors and interacts with the dynamic situation of flights around an airport tower as well as interacts with a human operator that can ...
Henry Hexmoor, Tim Heng
PPPJ
2004
ACM
15 years 10 months ago
Embedding JAAS in agent roles to apply local security policies
Agents are an emerging technology that grants programmers a new way to exploit distributed resources. Roles are a powerful concept that can be used to model agent interactions, all...
Giacomo Cabri, Luca Ferrari, Letizia Leonardi
152
Voted
COLCOM
2008
IEEE
15 years 6 months ago
SelectAudit: A Secure and Efficient Audit Framework for Networked Virtual Environments
Networked virtual environments (NVE) refer to the category of distributed applications that allow a large number of distributed users to interact with one or more central servers i...
Tuan Phan, Danfeng (Daphne) Yao
JDCTA
2010
172views more  JDCTA 2010»
14 years 11 months ago
Performance Test of An Embedded Real-Time Operating System Based on A New High-Security NetWork Computer
Performance indexes of the embedded real-time operating system are not isolated but interacting with each other. Two sets of elements aiming to describe the relationship between t...
Gengxin Sun, Fengjing Shao Name, Sheng Bin