Sciweavers

5722 search results - page 219 / 1145
» Security Function Interactions
Sort
View
ACSAC
2004
IEEE
15 years 4 months ago
Securing Java RMI-Based Distributed Applications
Both Java RMI and Jini use a proxy-based architecture. In this architecture, a client interacts with a service through a proxy, which is code downloaded from a directory and insta...
Ninghui Li, John C. Mitchell, Derrick Tong
BWCCA
2010
14 years 8 months ago
Constructivist Approach to Information Security Awareness in the Middle East
Abstract--This paper studies the application of an approach to enhance information security awareness amongst employees within middleeastern companies, in effort to improve informa...
Mohammed Boujettif, Yongge Wang
EUROSYS
2007
ACM
15 years 10 months ago
Melange: creating a "functional" internet
Most implementations of critical Internet protocols are written in type-unsafe languages such as C or C++ and are regularly vulnerable to serious security and reliability problems...
Anil Madhavapeddy, Alex Ho, Tim Deegan, David Scot...
FQAS
2004
Springer
103views Database» more  FQAS 2004»
15 years 6 months ago
A Unifying Framework for Flexible Information Access in Taxonomy-Based Sources
A taxonomy-based source consists of a taxonomy and a database storing objects that are indexed in terms of the taxonomy. For this kind of sources, we describe a flexible interacti...
Yannis Tzitzikas, Carlo Meghini, Nicolas Spyratos
CHI
2008
ACM
15 years 2 months ago
Secrets and lies in computer-mediated interaction: theory, methods and design
The keeping of secrets and practicing of deception are commonplace in everyday social interaction. They also serve an important role in encouraging social cohesion. However, for H...
Adam N. Joinson, Jeffrey T. Hancock, Pamela Briggs