Sciweavers

224 search results - page 27 / 45
» A General Methodology For The Development Of An Effective In...
Sort
View
DGO
2007
150views Education» more  DGO 2007»
13 years 9 months ago
Event-triggered data and knowledge sharing among collaborating government organizations
Solving complex global problems such as illegal immigration, border control, and terrorism requires government organizations at all levels to share not only data but, more importa...
Seema Degwekar, Jeff DePree, Howard W. Beck, Carla...
ER
2008
Springer
136views Database» more  ER 2008»
13 years 9 months ago
Automating the Extraction of Rights and Obligations for Regulatory Compliance
Abstract. Government regulations are increasingly affecting the security, privacy and governance of information systems in the United States, Europe and elsewhere. Consequently, co...
Nadzeya Kiyavitskaya, Nicola Zeni, Travis D. Breau...
BCSHCI
2007
13 years 9 months ago
A card-sorting probe of e-banking trust perceptions
This paper investigates the issue of trust mediation in eBanking. The card sorting technique was used to probe factors influencing subjects’ attitudes to alternative e-banking h...
Tim French, Kecheng Liu, Mark Springett
SIGCOMM
2004
ACM
14 years 1 months ago
Locating internet routing instabilities
This paper presents a methodology for identifying the autonomous system (or systems) responsible when a routing change is observed and propagated by BGP. The origin of such a rout...
Anja Feldmann, Olaf Maennel, Zhuoqing Morley Mao, ...
CCS
2006
ACM
13 years 11 months ago
Hot or not: revealing hidden services by their clock skew
Location-hidden services, as offered by anonymity systems such as Tor, allow servers to be operated under a pseudonym. As Tor is an overlay network, servers hosting hidden service...
Steven J. Murdoch