Sciweavers

343 search results - page 17 / 69
» The All-In Publication Policy
Sort
View
ISF
2007
69views more  ISF 2007»
14 years 9 months ago
Assessing the UK policies for broadband adoption
Broadband technology has been introduced to the business community and the public as a rapid way of exploiting the Internet. The benefits of its use (fast reliable connections, an...
Jyoti Choudrie, Anastasia Papazafeiropoulou
74
Voted
GPC
2007
Springer
15 years 3 months ago
Towards Feasible and Effective Load Sharing in a Heterogeneous Computational Grid
A grid has to provide strong incentive for participating sites to join and stay in it. Participating sites are concerned with the performance improvement brought by the gird for th...
Kuo-Chan Huang, Po-Chi Shih, Yeh-Ching Chung
CCS
2007
ACM
15 years 3 months ago
Dynamic pharming attacks and locked same-origin policies for web browsers
We describe a new attack against web authentication, which we call dynamic pharming. Dynamic pharming works by hijacking DNS and sending the victim’s browser malicious Javascrip...
Chris Karlof, Umesh Shankar, J. Doug Tygar, David ...
POPL
2005
ACM
15 years 9 months ago
Enterprise privacy promises and enforcement
Several formal languages have been proposed to encode privacy policies, ranging from the Platform for Privacy Preferences (P3P), intended for communicating privacy policies to con...
Adam Barth, John C. Mitchell
79
Voted
SACMAT
2004
ACM
15 years 3 months ago
Implementing access control to people location information
Ubiquitous computing uses a variety of information for which access needs to be controlled. For instance, a person’s current location is a sensitive piece of information, which ...
Urs Hengartner, Peter Steenkiste