Sciweavers

706 search results - page 109 / 142
» Trust management for IPsec
Sort
View
ACMICEC
2008
ACM
262views ECommerce» more  ACMICEC 2008»
15 years 1 months ago
Preventing information leakage between collaborating organisations
Information sharing and protection against leakage is a critical problem especially for organisations having sensitive information. Sharing content between individuals in the same...
Muntaha Alawneh, Imad M. Abbadi
CHI
2007
ACM
16 years 6 days ago
Password sharing: implications for security design based on social practice
Current systems for banking authentication require that customers not reveal their access codes, even to members of the family. A study of banking and security in Australia shows ...
Supriya Singh, Anuja Cabraal, Catherine Demostheno...
MOBISYS
2004
ACM
15 years 11 months ago
An Architecture for Privacy-Sensitive Ubiquitous Computing
Privacy is the most often-cited criticism of ubiquitous computing, and may be the greatest barrier to its long-term success. However, developers currently have little support in d...
Jason I. Hong, James A. Landay
CCS
2009
ACM
15 years 6 months ago
Towards secure dataflow processing in open distributed systems
Open distributed systems such as service oriented architecture and cloud computing have emerged as promising platforms to deliver software as a service to users. However, for many...
Juan Du, Wei Wei, Xiaohui Gu, Ting Yu
HICSS
2008
IEEE
187views Biometrics» more  HICSS 2008»
15 years 6 months ago
Relational Risk Mitigation: The Relationship Approach to Mitigating Risks in Business Process Outsourcing
Managing risks in outsourcing has been widely researched but is still not fully understood by either academics or practitioners. Recent research on IS outsourcing relationships ha...
Kim Wüllenweber, Stefanie Jahner, Helmut Krcm...