Sciweavers

304 search results - page 11 / 61
» Trusted Computing in Mobile Action
Sort
View
ICCS
2007
Springer
14 years 1 months ago
A Privacy-Aware Identity Design for Exploring Ubiquitous Collaborative Wisdom
Privacy and security has been considered as the top criterion for the acceptance of e-service adoption. In this paper, we proposed a privacy aware identity protection design that i...
Yuanchu Hwang, Soe-Tsyr Yuan
IDTRUST
2010
ACM
13 years 6 months ago
A proposal for collaborative internet-scale trust infrastructures deployment: the public key system (PKS)
Public Key technology is about multiple parties across different domains making assertions that can be chained together to make trust judgments. Today, the need for more interoper...
Massimiliano Pala
INTERACT
2003
13 years 9 months ago
Redefining Digital Audience: Models and Actions
: This paper presents a new theoretical model for audience participation in the context of HCI. Such a model is necessary because, while a great amount of new interactive solutions...
Paul Nemirovsky
SACMAT
2003
ACM
14 years 26 days ago
Dynamic access control: preserving safety and trust for network defense operations
We investigate the cost of changing access control policies dynamically as a response action in computer network defense. We compare and contrast the use of access lists and capab...
Prasad Naldurg, Roy H. Campbell
ACSC
2008
IEEE
14 years 2 months ago
A Local Broker enabled MobiPass architecture for enhancing trusted interaction efficiency
While mobile computing provides a potentially vast business opportunity for many industry participants, it also raises issues such as security and performance. This paper proposes...
Will Tao, Robert Steele