Sciweavers

343 search results - page 37 / 69
» The All-In Publication Policy
Sort
View
SIGCSE
2006
ACM
144views Education» more  SIGCSE 2006»
14 years 4 months ago
Case-based analysis: a practical tool for teaching computer ethics
Case-based analysis is a bottom-up methodology for ethical reasoning. In a teaching environment, it can be a useful alternative to top-down methods, such as Kantianism, utilitaria...
Michael J. Quinn
ICECCS
2005
IEEE
108views Hardware» more  ICECCS 2005»
14 years 4 months ago
Evolving Messaging Systems for Secure Role Based Messaging
This paper articulates a system design for the secure role based messaging model built based on existing messaging systems, public key infrastructures, and a privilege management ...
Gansen Zhao, David W. Chadwick
ICECCS
2005
IEEE
154views Hardware» more  ICECCS 2005»
14 years 4 months ago
Customizable Framework for Managing Trusted Components Deployed on Middleware
Due to the widespread trust threat under the open and dynamic Internet environment, the computer community has endeavored to engage in the studies of technologies for protecting a...
Minghui Zhou, Wenpin Jiao, Hong Mei
CCS
2005
ACM
14 years 4 months ago
Applications of secure electronic voting to automated privacy-preserving troubleshooting
Recent work [27, 15] introduced a novel peer-to-peer application that leverages content sharing and aggregation among the peers to diagnose misconfigurations on a desktop PC. Thi...
Qiang Huang, David Jao, Helen J. Wang
WPES
2004
ACM
14 years 4 months ago
Will your digital butlers betray you?
The cost of data storage is now so low that there is little necessity ever to delete anything. The consequence is denied oblivion—digital systems that remember forever and can b...
Frank Stajano