Sciweavers

350 search results - page 46 / 70
» From control effects to typed continuation passing
Sort
View
ESOP
2010
Springer
13 years 10 months ago
A Semantic Framework for Declassification and Endorsement
Language-based information flow methods offer a principled way to enforce strong security properties, but enforcing noninterference is too inflexible for realistic applications. Se...
Aslan Askarov, Andrew Myers
ECIS
2001
13 years 9 months ago
Cyberliability: Is the Chief Privacy Officer the Solution?
The primary responsibility of the Chief Privacy Officer (CPO) is to protect online consumer privacy by developing an organization's privacy policy and ensuring compliance wit...
Janice C. Sipior, Burke T. Ward
WCE
2007
13 years 8 months ago
LinkGuide: Towards a Better Collection of Hyperlinks in a Website Homepage
—A dramatic and continuous increase in the complexity and size of websites on the Internet makes rather difficult to build such websites with required information to be easily fo...
Ahmad Ammari, Valentina V. Zharkova
JNW
2008
126views more  JNW 2008»
13 years 7 months ago
Securing Wireless Sensor Networks: Security Architectures
Wireless sensor networking remains one of the most exciting and challenging research domains of our time. As technology progresses, so do the capabilities of sensor networks. Limit...
David Boyle, Thomas Newe
IJIPT
2007
91views more  IJIPT 2007»
13 years 7 months ago
Multi-tag RFID systems
: Successful object identification is the primary objective of radio frequency identification (RFID) technology. Yet, a recent major study by Wal-Mart has shown that object detec...
Leonid Bolotnyy, Gabriel Robins