Sciweavers

772 search results - page 50 / 155
» A Trust-Based Security Architecture for Ubiquitous Computing...
Sort
View
ICAIL
2009
ACM
14 years 2 months ago
Human-aided computer cognition for e-discovery
Throughout its history, AI researchers have alternatively seen their mission as producing computer behavior that is indistinguishable from that of humans or as providing computati...
Christopher Hogan, Robert Bauer, Dan Brassil
ITRUST
2004
Springer
14 years 1 months ago
Towards Dynamic Security Perimeters for Virtual Collaborative Networks
Abstract The Internet provides a ubiquitous, standards-based substrate for global communications of all kinds. Rapid advances are now being made in agreeing protocols and machine-p...
Ivan Djordjevic, Theodosis Dimitrakos
ASPLOS
2012
ACM
12 years 3 months ago
Architectural support for hypervisor-secure virtualization
Virtualization has become a standard part of many computer systems. A key part of virtualization is the all-powerful hypervisor which manages the physical platform and can access ...
Jakub Szefer, Ruby B. Lee
SACMAT
2010
ACM
13 years 6 months ago
An architecture for enforcing end-to-end access control over web applications
The web is now being used as a general platform for hosting distributed applications like wikis, bulletin board messaging systems and collaborative editing environments. Data from...
Boniface Hicks, Sandra Rueda, Dave King 0002, Thom...
AGENTS
1997
Springer
14 years 2 days ago
Software Agents and User Autonomy
: Software agents comprise a new area for research and soon will be embedded and ubiquitous in modern computing systems. In this formative phase, it is important to develop compreh...
Batya Friedman, Helen Nissenbaum