Sciweavers

313 search results - page 25 / 63
» Privacy in Location-Aware Computing Environments
Sort
View
ICICS
2009
Springer
13 years 5 months ago
Trusted Isolation Environment: An Attestation Architecture with Usage Control Model
The Trusted Computing Group (TCG) proposed remote attestation as a solution for establishing trust among distributed applications. However, current TCG attestation architecture req...
Anbang Ruan, Qingni Shen, Liang Gu, Li Wang, Lei S...
CHI
1992
ACM
13 years 12 months ago
Realizing a Video Environment: EuroPARC's RAVE System
At EuroPARC, we have been exploring ways to allow physically separatedcolleagues to work together effectively and naturally. In this paper, we briefly discuss several examples of ...
William W. Gaver, Thomas P. Moran, Allan MacLean, ...
TRUSTBUS
2007
Springer
14 years 2 months ago
The Meaning of Logs
While logging events is becoming increasingly common in computing, in communication and in collaborative environments, log systems need to satisfy increasingly challenging (if not ...
Sandro Etalle, Fabio Massacci, Artsiom Yautsiukhin
MOBISYS
2008
ACM
14 years 7 months ago
Trustworthy and personalized computing on public kiosks
Many people desire ubiquitous access to their personal computing environments. We present a system in which a user leverages a personal mobile device to establish trust in a publi...
Scott Garriss, Ramón Cáceres, Stefan...
SIGCSE
2006
ACM
144views Education» more  SIGCSE 2006»
14 years 1 months ago
Case-based analysis: a practical tool for teaching computer ethics
Case-based analysis is a bottom-up methodology for ethical reasoning. In a teaching environment, it can be a useful alternative to top-down methods, such as Kantianism, utilitaria...
Michael J. Quinn