Sciweavers

9640 search results - page 1773 / 1928
» Information Systems Development as an Activity
Sort
View
CCS
2010
ACM
14 years 3 months ago
A game theoretic model for digital identity and trust in online communities
Digital identity and trust management mechanisms play an important role on the Internet. They help users make decisions on trustworthiness of digital identities in online communit...
Tansu Alpcan, Cengiz Örencik, Albert Levi, Er...
HICSS
2009
IEEE
100views Biometrics» more  HICSS 2009»
14 years 3 months ago
A Theoretical Framework for Assessing Eavesdropping-Resistant Authentication Interfaces
A simple theoretical framework is developed to evaluate the security and usability of eavesdroppingresistant authentication schemes. Such schemes strive to allow users to authenti...
Bogdan Hoanca, Kenrick J. Mock
AOSD
2009
ACM
14 years 3 months ago
Enforcing security for desktop clients using authority aspects
Desktop client applications interact with both local and remote resources. This is both a benefit in terms of the rich features desktop clients can provide, but also a security r...
Brett Cannon, Eric Wohlstadter
SAC
2009
ACM
14 years 3 months ago
Online annotation and prediction for regime switching data streams
Regime switching models, in which the state of the world is locally stationary, are a useful abstraction for many continuous valued data streams. In this paper we develop an onlin...
Gordon J. Ross, Dimitris K. Tasoulis, Niall M. Ada...
CCS
2009
ACM
14 years 3 months ago
Reactive noninterference
Many programs operate reactively, patiently waiting for user input, subsequently running for a while producing output, and eventually returning to a state where they are ready to ...
Aaron Bohannon, Benjamin C. Pierce, Vilhelm Sj&oum...
« Prev « First page 1773 / 1928 Last » Next »