Sciweavers

422 search results - page 69 / 85
» Walking the Web of Trust
Sort
View
LISA
2001
15 years 1 months ago
Crypto Blunders
Cryptography has emerged as an enormously important component of the networked world. People are hesitant to trust the World Wide Web and e-commerce without the protections crypto...
Steve Burnett
ECIS
2000
15 years 1 months ago
IT-Enabled Sophistication Banking
- Globalization of financial markets resulting from both IT (particularly internet standards) and increasing homogeneity of regulation has strongly affected the environment, financ...
Hans Ulrich Buhl, Dennis Kundisch, Andreas Leinfel...
CORR
2011
Springer
195views Education» more  CORR 2011»
14 years 6 months ago
Context-aware Authorization in Highly Dynamic Environments
Highly dynamic computing environments, like ubiquitous and pervasive computing environments, require frequent adaptation of applications. Context is a key to adapt suiting user ne...
Jean-Yves Tigli, Stephane Lavirotte, Gaëtan R...
TKDE
2011
182views more  TKDE 2011»
14 years 6 months ago
Data Leakage Detection
—We study the following problem: A data distributor has given sensitive data to a set of supposedly trusted agents (third parties). Some of the data are leaked and found in an un...
Panagiotis Papadimitriou 0002, Hector Garcia-Molin...
SOSP
2007
ACM
15 years 8 months ago
Information flow control for standard OS abstractions
ion Flow Control for Standard OS Abstractions Maxwell Krohn Alexander Yip Micah Brodsky Natan Cliffer M. Frans Kaashoek Eddie Kohler† Robert Morris MIT CSAIL †UCLA http://flum...
Maxwell N. Krohn, Alexander Yip, Micah Z. Brodsky,...