Sciweavers

5119 search results - page 996 / 1024
» Security Privacy
Sort
View
OOPSLA
2007
Springer
15 years 3 months ago
The design and implementation of formal monitoring techniques
In runtime monitoring, a programmer specifies a piece of code to execute when a trace of events occurs during program execution. Previous and related work has shown that runtime m...
Eric Bodden
SOUPS
2006
ACM
15 years 3 months ago
Intentional access management: making access control usable for end-users
The usability of access control mechanisms in modern distributed systems has been widely criticized but little studied. In this paper, we carefully examine one such widely deploye...
Xiang Cao, Lee Iverson
SOUPS
2006
ACM
15 years 3 months ago
A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords
Previous research has found graphical passwords to be more memorable than non-dictionary or “strong” alphanumeric passwords. Participants in a prior study expressed concerns t...
Furkan Tari, A. Ant Ozok, Stephen H. Holden
WPES
2005
ACM
15 years 3 months ago
Anonymous yet accountable access control
This paper introduces a novel approach for augmenting attributebased access control systems in a way that allows them to offer fully anonymous access to resources while at the sam...
Michael Backes, Jan Camenisch, Dieter Sommer
CCGRID
2010
IEEE
14 years 10 months ago
Elastic Site: Using Clouds to Elastically Extend Site Resources
Infrastructure-as-a-Service (IaaS) cloud computing offers new possibilities to scientific communities. One of the most significant is the ability to elastically provision and relin...
Paul Marshall, Kate Keahey, Timothy Freeman