Sciweavers

243 search results - page 48 / 49
» Addressing privacy issues in CardSpace
Sort
View
CHI
2008
ACM
14 years 7 months ago
Ingimp: introducing instrumentation to an end-user open source application
Open source projects are gradually incorporating usability methods into their development practices, but there are still many unmet needs. One particular need for nearly any open ...
Michael Terry, Matthew Kay, Brad Van Vugt, Brandon...
TRUST
2009
Springer
14 years 1 months ago
Secure VPNs for Trusted Computing Environments
Abstract. Virtual Private Networks are a popular mechanism for building complex network infrastructures. Such infrastructures are usually accompanied by strict administrative restr...
Steffen Schulz, Ahmad-Reza Sadeghi
SACMAT
2009
ACM
14 years 1 months ago
Access control policy combining: theory meets practice
Many access control policy languages, e.g., XACML, allow a policy to contain multiple sub-policies, and the result of the policy on a request is determined by combining the result...
Ninghui Li, Qihua Wang, Wahbeh H. Qardaji, Elisa B...
OOPSLA
2007
Springer
14 years 1 months ago
Using early phase termination to eliminate load imbalances at barrier synchronization points
We present a new technique, early phase termination, for eliminating idle processors in parallel computations that use barrier synchronization. This technique simply terminates ea...
Martin C. Rinard
OOPSLA
2007
Springer
14 years 1 months ago
Statistically rigorous java performance evaluation
Java performance is far from being trivial to benchmark because it is affected by various factors such as the Java application, its input, the virtual machine, the garbage collect...
Andy Georges, Dries Buytaert, Lieven Eeckhout