Sciweavers

2927 search results - page 181 / 586
» Secure Distributed Human Computation
Sort
View
CHI
2007
ACM
16 years 2 months ago
Pictures at the ATM: exploring the usability of multiple graphical passwords
Users gain access to cash, confidential information and services at Automated Teller Machines (ATMs) via an authentication process involving a Personal Identification Number (PIN)...
Wendy Moncur, Grégory Leplâtre
116
Voted
COLCOM
2008
IEEE
15 years 9 months ago
A Constraint and Attribute Based Security Framework for Dynamic Role Assignment in Collaborative Environments
Abstract. We investigate a security framework for collaborative applications that relies on the role-based access control (RBAC) model. In our framework, roles are pre-defined and...
Isabel F. Cruz, Rigel Gjomemo, Benjamin Lin, Mirko...
CSFW
1992
IEEE
15 years 6 months ago
Attribute Support for Inter-Domain Use
Mary Ellen Zurko Laboratory for Computer Science Massachusetts Institute of Technology and Digital Equipment Corporation Littleton, MA, 01460 This paper describes the User Attribu...
Mary Ellen Zurko
CONCUR
2005
Springer
15 years 8 months ago
Constraint Solving for Contract-Signing Protocols
Research on the automatic analysis of cryptographic protocols has so far mainly concentrated on reachability properties, such as secrecy and authentication. Only recently it was sh...
Detlef Kähler, Ralf Küsters
IEEEPACT
2003
IEEE
15 years 7 months ago
Biomedical Computing and Visualization
Computers have changed the way we live, work, and even recreate. Now, they are transforming how we think about and treat human disease. In particular, advanced techniques in biome...
Chris Johnson