Sciweavers

497 search results - page 33 / 100
» Privacy Enhanced Technologies: Methods - Markets - Misuse
Sort
View
CSCW
2006
ACM
15 years 10 months ago
Of pill boxes and piano benches: "home-made" methods for managing medication
We report on the results of an ethnographic study of how elders manage their medication with the objective of informing the design of in-home assistive health technology to suppor...
Leysia Palen, Stinne Aaløkke Ballegaard
CCS
2009
ACM
16 years 5 months ago
Formalizing information security knowledge
Unified and formal knowledge models of the information security domain are fundamental requirements for supporting and enhancing existing risk management approaches. This paper de...
Stefan Fenz, Andreas Ekelhart
ACSAC
2002
IEEE
15 years 9 months ago
Networking in The Solar Trust Model: Determining Optimal Trust Paths in a Decentralized Trust Network
The Solar Trust Model provides a method by which the sender of a message can be authenticated, and the level of trust that can be placed in the sender of the message or the messag...
Michael Clifford
IJNSEC
2006
88views more  IJNSEC 2006»
15 years 4 months ago
Secure Internet Applications Based on Mobile Agents
The increasing importance of the Internet has motivated the exploration of new execution models based on mobile and dynamic entities to overcome the limits of the client/server mo...
Cungang Yang
DLOG
2006
15 years 5 months ago
Static Knowledge Representation of Multi-Agent System's Specification by Description Logic
Modularity and rigor are two key elements for multi-agent technology. Hong Zhu's multi-agent system (MAS) development method provides proper language facilities supporting mo...
Haiyan Che, Jigui Sun