Sciweavers

735 search results - page 109 / 147
» Remote System Management Principles
Sort
View
116
Voted
ACSAC
2000
IEEE
15 years 6 months ago
Enabling Secure On-Line DNS Dynamic Update
Domain Name System (DNS) is the system for the mapping between easily memorizable host names and their IP addresses. Due to its criticality, security extensions to DNS have been p...
Xunhua Wang, Yih Huang, Yvo Desmedt, David Rine
102
Voted
EDBT
2010
ACM
147views Database» more  EDBT 2010»
15 years 8 months ago
A simple (yet powerful) algebra for pervasive environments
Querying non-conventional data is recognized as a major issue in new environments and applications such as those occurring in pervasive computing. A key issue is the ability to qu...
Yann Gripay, Frédérique Laforest, Je...
103
Voted
HICSS
2007
IEEE
162views Biometrics» more  HICSS 2007»
15 years 8 months ago
Value-at-Risk in IT Services Contracts
As information systems (IS) and technology solutions become increasingly service-driven, managers are faced with the task of choosing parameters such as service-levels, pricing, a...
Robert J. Kauffman, Ryan Sougstad
101
Voted
CSCW
2006
ACM
15 years 8 months ago
What goes around comes around: an analysis of del.icio.us as social space
An emergent class of web applications blurs the boundary between single user application and online public space. Recently popular web applications like del.icio.us help manage in...
Kathy J. Lee
IFIP
2005
Springer
15 years 7 months ago
A Logic for Analysing Subterfuge in Delegation Chains
Abstract. Trust Management is an approach to construct and interpret the trust relationships among public-keys that are used to mediate security-critical actions. Cryptographic cre...
Hongbin Zhou, Simon N. Foley