Sciweavers

754 search results - page 113 / 151
» Can self-managed systems be trusted
Sort
View
SIGSOFT
2008
ACM
14 years 9 months ago
Effective blame for information-flow violations
Programs trusted with secure information should not release that information in ways contrary to system policy. However, when a program contains an illegal flow of information, cu...
Dave King 0002, Trent Jaeger, Somesh Jha, Sanjit A...
APCSAC
2003
IEEE
14 years 2 months ago
User-Level Management of Kernel Memory
Abstract. Kernel memory is a resource that must be managed carefully in order to ensure the efficiency and safety of the system. The use of an inappropriate management policy can w...
Andreas Haeberlen, Kevin Elphinstone
ACNS
2003
Springer
131views Cryptology» more  ACNS 2003»
14 years 2 months ago
On the Security of Two Threshold Signature Schemes with Traceable Signers
A (t, n) threshold signature scheme allows t or more group members to generate signatures on behalf of a group with n members, while any t−1 or less members cannot do the same th...
Guilin Wang, Xiaoxi Han, Bo Zhu
CHI
2008
ACM
14 years 9 months ago
Lifting the veil: improving accountability and social transparency in Wikipedia with wikidashboard
Wikis are collaborative systems in which virtually anyone can edit anything. Although wikis have become highly popular in many domains, their mutable nature often leads them to be...
Bongwon Suh, Ed H. Chi, Aniket Kittur, Bryan A. Pe...
HICSS
2005
IEEE
129views Biometrics» more  HICSS 2005»
14 years 2 months ago
An Integrated Approach to Online Partnership Building
Research in information sciences in recent years has dealt with how to support collaborative work across time, space and organizational boundaries. However, this research neglecte...
Tobias Keim, Tim Weitzel