Sciweavers

298 search results - page 33 / 60
» Computer security: quality rather than quantity
Sort
View
STORAGESS
2005
ACM
14 years 3 months ago
Toward a threat model for storage systems
The growing number of storage security breaches as well as the need to adhere to government regulations is driving the need for greater storage protection. However, there is the l...
Ragib Hasan, Suvda Myagmar, Adam J. Lee, William Y...
CCS
2005
ACM
14 years 3 months ago
Automated trust negotiation using cryptographic credentials
In automated trust negotiation (ATN), two parties exchange digitally signed credentials that contain attribute information to establish trust and make access control decisions. Be...
Jiangtao Li, Ninghui Li, William H. Winsborough
CHI
2000
ACM
14 years 2 months ago
Developing a context-aware electronic tourist guide: some issues and experiences
In this paper, we describe our experiences of developing and evaluating GUIDE, an intelligent electronic tourist guide. The GUIDE system has been built to overcome many of the lim...
Keith Cheverst, Nigel Davies, Keith Mitchell, Adri...
SIGCSE
2008
ACM
136views Education» more  SIGCSE 2008»
13 years 9 months ago
A new paradigm for programming competitions
The annual ACM International Collegiate Programming Contest produces a competitive paradigm that is at odds with the pedagogical goals of modern computer science and software engi...
James F. Bowring
JCP
2007
154views more  JCP 2007»
13 years 9 months ago
Introducing Virtual Private Overlay Network Services in Large Scale Grid Infrastructures
—The computational Grid concept is gaining great popularity as the best way to deliver access to a wide range of distributed computing and data resources. But, as Grids move from...
Francesco Palmieri