Sciweavers

328 search results - page 34 / 66
» Identity-Enriched Session Management
Sort
View
ESORICS
2003
Springer
14 years 26 days ago
Hardware Encapsulation of Security Services
Hardware security modules can be used to encapsulate simple security services that bind security functions such as decryption with authorisation and authentication. Such hardware ...
Adrian Baldwin, Simon Shiu
ARESEC
2011
110views more  ARESEC 2011»
12 years 7 months ago
ACON: Activity-Centric Access Control for Social Computing
—With increasing amount of sensitive user data stored in social computing systems (SCSs) and lack of consensus on how it should be protected under meaningful control by the avera...
Jaehong Park, Ravi S. Sandhu, Yuan Cheng
PERCOM
2009
ACM
14 years 2 months ago
BitHoc: A content sharing application for Wireless Ad hoc Networks
—As a result of the wide spread of new efficient mobile communication devices, users are more and more willing to find on these devices (PDAs, Smartphones, etc) applications si...
Amir Krifa, Mohamed Karim Sbai, Chadi Barakat, Thi...
DSN
2007
IEEE
14 years 2 months ago
Automatic Cookie Usage Setting with CookiePicker
HTTP cookies have been widely used for maintaining session states, personalizing, authenticating, and tracking user behaviors. Despite their importance and usefulness, cookies hav...
Chuan Yue, Mengjun Xie, Haining Wang
SIGCSE
2005
ACM
366views Education» more  SIGCSE 2005»
14 years 1 months ago
Using asynchronous discussions to enhance student participation in CS courses
As Computer Science (CS) educators, we are involved in teaching a variety of undergraduate and graduate courses such as database management systems, networking, software developme...
Bhagyavati, Stan Kurkovsky, Christopher C. Whitehe...