Sciweavers

3021 search results - page 475 / 605
» Trust in recommender systems
Sort
View
ACMSE
2006
ACM
14 years 5 months ago
Mobile-driven architecture for managing enterprise security policies
Authentication, access control, and audit (3As) are three fundamental mechanisms in enterprise security management for countering various types of looming threats from both inside...
William Claycomb, Dongwan Shin
ACSAC
2005
IEEE
14 years 4 months ago
An Integrity Verification Scheme for DNS Zone file based on Security Impact Analysis
The Domain Name System (DNS) is the world’s largest distributed computing system that performs the key function of translating user-friendly domain names to IP addresses through...
Ramaswamy Chandramouli, Scott Rose
HICSS
2005
IEEE
100views Biometrics» more  HICSS 2005»
14 years 4 months ago
'Today' Messages: Lightweight Support for Small Group Awareness via Email
‘Today’ messages are short status emails sent daily by members of a project team. We present the results of a field study of the use of ‘today’ messages by six small work ...
A. J. Bernheim Brush, Alan Borning
HICSS
2005
IEEE
129views Biometrics» more  HICSS 2005»
14 years 4 months ago
An Integrated Approach to Online Partnership Building
Research in information sciences in recent years has dealt with how to support collaborative work across time, space and organizational boundaries. However, this research neglecte...
Tobias Keim, Tim Weitzel
GROUP
2005
ACM
14 years 4 months ago
Timing in the art of integration: 'that's how the bastille got stormed'
This paper uses a long term ethnographic study of the design and implementation of an electronic patient records (EPR) system in a UK hospital Trust to consider issues arising in ...
David Martin, Mark Rouncefield, Jacki O'Neill, Mar...