Sciweavers

422 search results - page 67 / 85
» Risk management for distributed authorization
Sort
View
CN
2007
172views more  CN 2007»
15 years 4 months ago
Threshold cryptography in P2P and MANETs: The case of access control
Ad hoc groups, such as peer-to-peer (P2P) systems and mobile ad hoc networks (MANETs) represent recent technological advancements. They support low-cost, scalable and fault-tolera...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
143
Voted
IJEB
2007
127views more  IJEB 2007»
15 years 4 months ago
Factors mediating the routinisation of e-learning within a traditional university education environment
Technology-enhanced or Computer Aided Learning (e-learning) can be institutionally integrated and supported by learning management systems or Virtual Learning Environments (VLEs) ...
Shafqat Hameed, John Mellor, Atta Badii, Niyati Pa...
COMPUTER
2004
120views more  COMPUTER 2004»
15 years 4 months ago
Computer Security in the Real World
After thirty years of work on computer security, why are almost all the systems in service today extremely vulnerable to attack? The main reason is that security is expensive to s...
Butler W. Lampson
ISR
2011
14 years 7 months ago
Compatibility and Proprietary Standards: The Impact of Conversion Technologies in IT Markets with Network Effects
e from http://ssrn.com/abstract=980726 Acknowledgements: The authors thank Ramayya Krishnan, Marshall Van Alstyne, Senior Editor Sanjeev Dewan, the associate editor and referees fo...
Charles Zhechao Liu, Esther Gal-Or, Chris F. Kemer...
CSCW
2012
ACM
13 years 11 months ago
Social coding in GitHub: transparency and collaboration in an open software repository
Social applications on the web let users track and follow the activities of a large number of others regardless of location or affiliation. There is a potential for this transpare...
Laura A. Dabbish, H. Colleen Stuart, Jason Tsay, J...