Sciweavers

1120 search results - page 109 / 224
» Trust in Electronic Environments
Sort
View
SAC
2009
ACM
14 years 3 months ago
Taking total control of voting systems: firmware manipulations on an optical scan voting terminal
The firmware of an electronic voting machine is typically treated as a “trusted” component of the system. Consequently, it is misconstrued to be vulnerable only to an insider...
Seda Davtyan, Sotiris Kentros, Aggelos Kiayias, La...
IWIPS
2004
80views Business» more  IWIPS 2004»
13 years 11 months ago
Website Design and Culture: An Empirical Investigation
Understanding website preferences across cultures is imperative to the development of customer loyalty in online environments. Based on an exploratory four nation study, this pape...
Dianne Cyr, Joe Ilsever, Carole Bonanni, John Bowe...
OSDI
2006
ACM
14 years 10 months ago
Making Information Flow Explicit in HiStar
HiStar is a new operating system designed to minimize the amount of code that must be trusted. HiStar provides strict information flow control, which allows users to specify preci...
David Mazières, Eddie Kohler, Nickolai Zeld...
CISIS
2009
IEEE
14 years 5 months ago
A Security Layer for JXTA Core Protocols
— JXTA defines a set of six core protocols specifically suited for ad hoc, pervasive, multi-hop, peer-to-peer (P2P) computing. These protocols allow peers to cooperate and form...
Joan Arnedo-Moreno, Jordi Herrera-Joancomart&iacut...
CSE
2009
IEEE
14 years 5 months ago
Ceremonies Formal Analysis in PKI's Context
—Ceremonies are a useful tool to establish trust in scenarios where protocols operate. They describe a greater range of issues not taken into account by protocol designers. We ta...
Jean Everson Martina, Túlio Cicero Salvaro ...