Sciweavers

555 search results - page 103 / 111
» Anonymous Webs of Trust
Sort
View
ECRIME
2007
14 years 1 months ago
Behavioral response to phishing risk
Tools that aim to combat phishing attacks must take into account how and why people fall for them in order to be effective. This study reports a pilot survey of 232 computer users...
Julie S. Downs, Mandy B. Holbrook, Lorrie Faith Cr...
EXACT
2007
14 years 4 days ago
PML 2: A Modular Explanation Interlingua
In the past five years, we have designed and evolved an interlingua for sharing explanations generated by various automated systems such as hybrid web-based question answering sys...
Deborah L. McGuinness, Li Ding, Paulo Pinheiro da ...
NSDI
2007
14 years 4 days ago
TightLip: Keeping Applications from Spilling the Beans
Access control misconfigurations are widespread and can result in damaging breaches of confidentiality. This paper presents TightLip, a privacy management system that helps user...
Aydan R. Yumerefendi, Benjamin Mickle, Landon P. C...
PDPTA
2008
13 years 11 months ago
Intrusion-Tolerant Dissemination in Large-Scale Systems
Abstract - With the growth of the Internet and increased demand for Web Services has come a heightened need for scalable wide-area group communication systems. The need for trust i...
Kim Potter Kihlstrom, Robin Elliott, Kelsey Marshm...
IADIS
2004
13 years 11 months ago
A Model of E-Commerce for the Highly Valuable Traditional Products in Thailand
As e-commerce is considered an excellent alternative for business to reach new customers, interests in design principles for e-commerce websites, are increasing. However, not many...
Sakuna Vanichvisuttikul, Chamnong Jungthirapanich