Sciweavers

343 search results - page 61 / 69
» The All-In Publication Policy
Sort
View
SACMAT
2009
ACM
14 years 3 months ago
A decision support system for secure information sharing
In both the commercial and defense sectors a compelling need is emerging for highly dynamic, yet risk optimized, sharing of information across traditional organizational boundarie...
Achille Fokoue, Mudhakar Srivatsa, Pankaj Rohatgi,...
SOUPS
2009
ACM
14 years 3 months ago
Challenges in supporting end-user privacy and security management with social navigation
Social navigation is a promising approach for supporting privacy and security management. By aggregating and presenting the choices made by others, social navigation systems can p...
Jeremy Goecks, W. Keith Edwards, Elizabeth D. Myna...
SOUPS
2009
ACM
14 years 3 months ago
Who's viewed you?: the impact of feedback in a mobile location-sharing application
Feedback is viewed as an essential element of ubiquitous computing systems in the HCI literature for helping people manage their privacy. However, the success of online social net...
Janice Y. Tsai, Patrick Gage Kelley, Paul Hankes D...
KBSE
2007
IEEE
14 years 2 months ago
Modeling bug report quality
Software developers spend a significant portion of their resources handling user-submitted bug reports. For software that is widely deployed, the number of bug reports typically ...
Pieter Hooimeijer, Westley Weimer
CCS
2007
ACM
14 years 2 months ago
Alpaca: extensible authorization for distributed services
Traditional Public Key Infrastructures (PKI) have not lived up to their promise because there are too many ways to define PKIs, too many cryptographic primitives to build them wi...
Chris Lesniewski-Laas, Bryan Ford, Jacob Strauss, ...