Sciweavers

400 search results - page 69 / 80
» Enabling Personal Privacy for Pervasive Computing Environmen...
Sort
View
IDTRUST
2010
ACM
14 years 11 days ago
Federated login to TeraGrid
We present a new federated login capability for the TeraGrid, currently the world’s largest and most comprehensive distributed cyberinfrastructure for open scientific research....
Jim Basney, Terry Fleury, Von Welch
IDTRUST
2009
ACM
14 years 2 months ago
Usable trust anchor management
Security in browsers is based upon users trusting a set of root Certificate Authorities (called Trust Anchors) which they may know little or nothing about. Browser vendors face a...
Massimiliano Pala, Scott A. Rea
CCS
2007
ACM
14 years 1 months ago
Dynamic pharming attacks and locked same-origin policies for web browsers
We describe a new attack against web authentication, which we call dynamic pharming. Dynamic pharming works by hijacking DNS and sending the victim’s browser malicious Javascrip...
Chris Karlof, Umesh Shankar, J. Doug Tygar, David ...
CCS
2007
ACM
14 years 1 months ago
A simple and expressive semantic framework for policy composition in access control
In defining large, complex access control policies, one would like to compose sub-policies, perhaps authored by different organizations, into a single global policy. Existing po...
Glenn Bruns, Daniel S. Dantas, Michael Huth
PG
2002
IEEE
14 years 13 days ago
Combining 2D Feature Tracking and Volume Reconstruction for Online Video-Based Human Motion Capture
The acquisition of human motion data is of major importance for creating interactive virtual environments, intelligent user interfaces, and realistic computer animations. Today’...
Christian Theobalt, Marcus A. Magnor, Pascal Sch&u...