Sciweavers

1229 search results - page 195 / 246
» Trusted Computing
Sort
View
NSDI
2007
13 years 10 months ago
TightLip: Keeping Applications from Spilling the Beans
Access control misconfigurations are widespread and can result in damaging breaches of confidentiality. This paper presents TightLip, a privacy management system that helps user...
Aydan R. Yumerefendi, Benjamin Mickle, Landon P. C...
ATAL
2008
Springer
13 years 9 months ago
Tags and image scoring for robust cooperation
Establishing and maintaining cooperation is an enduring problem in multi-agent systems and, although several solutions exist, the increased use of online trading systems, peerto-p...
Nathan Griffiths
ATAL
2008
Springer
13 years 9 months ago
The intermediary agent's brain: supporting learning to collaborate at the inter-personal level
We discuss the design of the Intermediary Agent's brain, the control module of an embodied conversational virtual peer in a simulation game aimed at providing learning experi...
Juan Martínez-Miranda, Bernhard Jung, Sabin...
CCS
2008
ACM
13 years 9 months ago
On spatio-temporal constraints and inheritance in role-based access control
Pervasive computing environments have created a requirement for spatial- and temporal-aware access control systems. Although temporal, spatial and spatio-temporal role-based acces...
Liang Chen, Jason Crampton
ECIS
2001
13 years 9 months ago
The golden circle: A case study of organizational change at the London Ambulance Service
This paper analyzes the way in which the London Ambulance Service (LAS) recovered from the events of October 1992, when it implemented a computer aided despatch system (LASCAD) th...
Kathy McGrath