Sciweavers

1022 search results - page 26 / 205
» Towards an Evaluation Methodology for Computational Trust Sy...
Sort
View
FC
2001
Springer
123views Cryptology» more  FC 2001»
14 years 4 days ago
Trust: A Collision of Paradigms
The technological challenges of securing networks are great, as recently witnessed in widespread denial of service and virus attacks. The human reaction to these attacks may be ei...
L. Jean Camp, Helen Nissenbaum, Cathleen McGrath
PDP
2010
IEEE
14 years 2 months ago
Trusted Interaction Patterns in Large-scale Enterprise Service Networks
Abstract—The evolution towards cross-organizational collaboration and interaction patterns has led to the emergence of scalable, Web services-based composition infrastructures. T...
Florian Skopik, Daniel Schall, Schahram Dustdar
USS
2004
13 years 9 months ago
Design of the EROS Trusted Window System
Window systems are the primary mediator of user input and output in modern computing systems. They are also a commonly used interprocess communication mechanism. As a result, they...
Jonathan S. Shapiro, John Vanderburgh, Eric Northu...
TRUST
2010
Springer
14 years 22 days ago
Beyond Kernel-Level Integrity Measurement: Enabling Remote Attestation for the Android Platform
Abstract. Increasing adoption of smartphones in recent times has begun to attract more and more malware writers towards these devices. Among the most prominent and widely adopted o...
Mohammad Nauman, Sohail Khan, Xinwen Zhang, Jean-P...
UAIS
2002
100views more  UAIS 2002»
13 years 7 months ago
Toward overcoming culture, skill and situation hurdles in Human-Computer Interaction
Abstract. This paper proposes a new effective strategy for designing and implementing interactive systems overcoming culture, skill and situation hurdles in HumanComputer Interacti...
Paola Carrara, Daniela Fogli, Giuseppe Fresta, Pie...