Sciweavers

5722 search results - page 433 / 1145
» Security Function Interactions
Sort
View
IFIPTM
2010
204views Management» more  IFIPTM 2010»
15 years 2 months ago
xESB: An Enterprise Service Bus for Access and Usage Control Policy Enforcement
Enforcing complex policies that span organizational domains is an open challenge. Current work on SOA policy enforcement splits security in logical components that can be distribut...
Gabriela Gheorghe, Stephan Neuhaus, Bruno Crispo
CHI
2003
ACM
16 years 4 months ago
Safe & sound: a wireless leash
Safe & Sound uses location-aware mobile phones to create a "virtual leash"; a secure zone beyond which a child may not travel. If the child leaves this zone, both ch...
Natalia Marmasse, Chris Schmandt
CHI
2010
ACM
15 years 9 months ago
Vote-o-graph: a dishonest touchscreen voting system
We present Vote-O-Graph, an experimental touchscreen voting system designed to simulate reported interface issues in existing electronic voting systems. Touchscreen miscalibration...
Andrea L. Mascher, Paul T. Cotton, Douglas W. Jone...
BCSHCI
2009
15 years 2 months ago
Digital parenting: designing children's safety
In this paper, I describe an ethnographic study of children and parents looking at issues of domestic privacy and security. I will provide an overview of parental rules and strate...
Jennifer A. Rode
FCS
2006
15 years 5 months ago
Algorithmic Control in Concurrent Computations
: In this paper, functioning and interaction of distributed devices and concurrent algorithms are analyzed in the context of the theory of algorithms. Although different systems in...
Mark Burgin