Sciweavers

2927 search results - page 3 / 586
» Secure Distributed Human Computation
Sort
View
90
Voted
IFIP
1992
Springer
15 years 5 months ago
Human Factors In Computer Security
Ibibia Dabipi, Husam Yaghi, Issam Qasem
85
Voted
ATAL
2011
Springer
14 years 2 months ago
Improved computational models of human behavior in security games
Rong Yang, Christopher Kiekintveld, Fernando Ord&o...
115
Voted
XMLSEC
2003
ACM
15 years 7 months ago
First experiences using XACML for access control in distributed systems
Authorization systems today are increasingly complex. They span domains of administration, rely on many different authentication sources, and manage permissions that can be as com...
Markus Lorch, Seth Proctor, Rebekah Lepro, Dennis ...
132
Voted
CCS
2009
ACM
15 years 9 months ago
Privacy-preserving genomic computation through program specialization
In this paper, we present a new approach to performing important classes of genomic computations (e.g., search for homologous genes) that makes a significant step towards privacy...
Rui Wang, XiaoFeng Wang, Zhou Li, Haixu Tang, Mich...