Sciweavers

6861 search results - page 135 / 1373
» Security for Ubiquitous Computing
Sort
View
COMPSEC
2004
156views more  COMPSEC 2004»
15 years 3 months ago
Computer security impaired by legitimate users
Computer security has traditionally been assessed from a technical point of view. Another way to assess it is by investigating the role played by legitimate users of systems in imp...
Denis Besnard, Budi Arief
CHI
2006
ACM
16 years 4 months ago
Support for activity-based computing in a personal computing operating system
Research has shown that computers are notoriously bad at supporting the management of parallel activities and interruptions, and that mobility increases the severity and scope of ...
Jakob E. Bardram, Jonathan Bunde-Pedersen, Mads S&...
ICICS
1997
Springer
15 years 8 months ago
An implementable scheme for secure delegation of computing and data
The need for delegating information arises when the data owner wants to have her data handled by an external party. If the external party is untrusted and data are confidential, d...
Josep Domingo-Ferrer, Ricardo X. Sanchez del Casti...
ESORICS
1994
Springer
15 years 8 months ago
Liability and Computer Security: Nine Principles
The conventional wisdom is that security priorities should be set by risk analysis. However, reality is subtly different: many computer security systems are at least as much about ...
Ross J. Anderson
DEBU
2007
131views more  DEBU 2007»
15 years 4 months ago
Future Trends in Secure Chip Data Management
Secure chips, e.g. present in smart cards, TPM, USB dongles are now ubiquitous in applications with strong security requirements. Secure chips host personal data that must be care...
Nicolas Anciaux, Luc Bouganim, Philippe Pucheral