Sciweavers

40 search results - page 5 / 8
» Achieving trust in IT outsourcing relationships
Sort
View
TRUST
2009
Springer
14 years 2 months ago
ACPI: Design Principles and Concerns
Abstract. ACPI (Advanced Configuration Power Interface) allows operating systems to efficiently configure the hardware platform they are running on and deal with power management...
Loïc Duflot, Olivier Levillain, Benjamin Mori...
COMPSAC
2003
IEEE
14 years 29 days ago
Facilitating Secure Ad hoc Service Discovery in Public Environments
Securely accessing unfamiliar services in public environments using ad hoc wireless networks is challenging. We present a proxy-based approach that uses other existing network cha...
Feng Zhu, Matt W. Mutka, Lionel M. Ni
USS
2008
13 years 10 months ago
Verifying Compliance of Trusted Programs
In this paper, we present an approach for verifying that trusted programs correctly enforce system security goals when deployed. A trusted program is trusted to only perform safe ...
Sandra Rueda, Dave King 0002, Trent Jaeger
HICSS
1997
IEEE
122views Biometrics» more  HICSS 1997»
13 years 12 months ago
Developing Trust in Virtual Teams
A research project with distributed electronic teams was conducted to examine how virtual temporary teams quickly develop and maintain trust relationships with people that they ha...
Suzanne Iacono, Suzanne P. Weisband
HICSS
2009
IEEE
108views Biometrics» more  HICSS 2009»
14 years 2 months ago
E-File Adoption: A Study of U.S. Taxpayers' Intentions
In the United States, congress has set goals for the diffusion of e-government initiatives. One of congress’ goals for 2007 was for 80% of tax and informational returns to be fil...
L. Christian Schaupp, Lemuria Carter, Jeff Hobbs