Sciweavers

739 search results - page 23 / 148
» Security Challenges in Cloud Computing
Sort
View
93
Voted
SOUPS
2009
ACM
15 years 8 months ago
Personal choice and challenge questions: a security and usability assessment
Challenge questions are an increasingly important part of mainstream authentication solutions, yet there are few published studies concerning their usability or security. This pap...
Mike Just, David Aspinall
85
Voted
ACMSE
2007
ACM
15 years 5 months ago
Honeypots: concepts, approaches, and challenges
Information security is a growing concern today for organizations and individuals alike. This has led to growing interest in more aggressive forms of defense to supplement the exi...
Iyatiti Mokube, Michele Adams
INTERACT
2007
15 years 3 months ago
Usability Challenges in Security and Privacy Policy-Authoring Interfaces
Abstract. Policies, sets of rules that govern permission to access resources, have long been used in computer security and online privacy management; however, the usability of auth...
Robert W. Reeder, Clare-Marie Karat, John Karat, C...
WMASH
2003
ACM
15 years 7 months ago
Challenge: ubiquitous location-aware computing and the "place lab" initiative
To be widely adopted, location-aware computing must be as effortless, familiar and rewarding as web search tools like Google. We envisage the global scale Place Lab, consisting of...
Bill N. Schilit, Anthony LaMarca, Gaetano Borriell...
121
Voted
CORR
2010
Springer
169views Education» more  CORR 2010»
15 years 1 months ago
ElasTraS: An Elastic Transactional Data Store in the Cloud
Over the last couple of years, "Cloud Computing" or "Elastic Computing" has emerged as a compelling and successful paradigm for internet scale computing. One o...
Sudipto Das, Divyakant Agrawal, Amr El Abbadi