Sciweavers

189 search results - page 26 / 38
» Non-delegatable authorities in capability systems
Sort
View
HUC
2010
Springer
13 years 8 months ago
SNUPI: sensor nodes utilizing powerline infrastructure
A persistent concern of wireless sensors is the power consumption required for communication, which presents a significant adoption hurdle for practical ubiquitous computing appli...
Gabe Cohn, Erich P. Stuntebeck, Jagdish Pandey, Br...
CCS
2010
ACM
13 years 7 months ago
Input generation via decomposition and re-stitching: finding bugs in Malware
Attackers often take advantage of vulnerabilities in benign software, and the authors of benign software must search their code for bugs in hopes of finding vulnerabilities before...
Juan Caballero, Pongsin Poosankam, Stephen McCaman...
JWSR
2008
147views more  JWSR 2008»
13 years 7 months ago
Karma2: Provenance Management for Data-Driven Workflows
: The increasing ability for the sciences to sense the world around us is resulting in a growing need for data driven applications that are under the control of workflows composed ...
Yogesh L. Simmhan, Beth Plale, Dennis Gannon
CHI
2004
ACM
14 years 7 months ago
Affective sensors, privacy, and ethical contracts
Sensing affect raises critical privacy concerns, which are examined here using ethical theory, and with a study that illuminates the connection between ethical theory and privacy....
Carson Reynolds, Rosalind W. Picard
IDTRUST
2009
ACM
14 years 2 months ago
Usable trust anchor management
Security in browsers is based upon users trusting a set of root Certificate Authorities (called Trust Anchors) which they may know little or nothing about. Browser vendors face a...
Massimiliano Pala, Scott A. Rea