Sciweavers

247 search results - page 1 / 50
» Information hiding for trusted system design
Sort
View
DAC
2009
ACM
14 years 2 months ago
Information hiding for trusted system design
For a computing system to be trusted, it is equally important to verify that the system performs no more and no less functionalities than desired. Traditional testing and verifica...
Junjun Gu, Gang Qu, Qiang Zhou
CAISE
2006
Springer
13 years 11 months ago
Trusted Interaction: User Control and System Responsibilities in Interaction Design for Information Systems
Trust emerges from interaction. If trust in information systems is to be promoted, then attention must be directed, at least in part, to interaction design. This presentation will ...
Larry L. Constantine
ICIP
2008
IEEE
14 years 9 months ago
Managing privacy data in pervasive camera networks
Privacy protection of visual information is increasingly important as pervasive camera networks becomes more prevalent. The proposed scheme addresses the problem of preserving and...
Sen-Ching S. Cheung, Jithendra K. Paruchuri, Thinh...
SIGSOFT
2005
ACM
14 years 8 months ago
Information hiding interfaces for aspect-oriented design
The growing popularity of aspect-oriented languages, such as AspectJ, and of corresponding design approaches, makes it important to learn how best to modularize programs in which ...
Kevin J. Sullivan, William G. Griswold, Yuanyuan S...
CHI
2008
ACM
14 years 7 months ago
Recovering trust and avoiding escalation: an overlooked design goal of social systems
The online trust discussion is focused on mechanisms for building and maintaining user trust. This paper introduces the relevance of providing for the repair of trust breakdowns. ...
Asimina Vasalou, Jens Riegelsberger