Sciweavers

464 search results - page 65 / 93
» Identity Management
Sort
View
118
Voted
PERSUASIVE
2007
Springer
15 years 8 months ago
Fine Tuning the Persuasion in Persuasive Games
Persuasive games are a relatively new phenomenon, and hold promise as effective vehicles for persuasion. As yet, however, there are few set rules guiding how to design persuasive ...
Rilla Khaled, Pippin Barr, James Noble, Ronald Fis...
134
Voted
GCC
2004
Springer
15 years 8 months ago
Integrating Trust in Grid Computing Systems
A Grid computing system is a virtual resource framework. Inside the framework, resources are being shared among autonomous domains which can be geographically distributed. One prim...
Woodas W. K. Lai, Kam-Wing Ng, Michael R. Lyu
ICS
1999
Tsinghua U.
15 years 6 months ago
Symmetry and performance in consistency protocols
A consistency protocol can be termed symmetric if all processors are treated identically when they access common resources. By contrast, asymmetric protocols usually assign a home...
Peter J. Keleher
125
Voted
SOSP
2003
ACM
15 years 11 months ago
Decentralized user authentication in a global file system
The challenge for user authentication in a global file system is allowing people to grant access to specific users and groups in remote administrative domains, without assuming ...
Michael Kaminsky, George Savvides, David Mazi&egra...
147
Voted
WWW
2010
ACM
15 years 9 months ago
Alhambra: a system for creating, enforcing, and testing browser security policies
Alhambra is a browser-based system designed to enforce and test web browser security policies. At the core of Alhambra is a policyenhanced browser supporting fine-grain security ...
Shuo Tang, Chris Grier, Onur Aciiçmez, Samu...