Sciweavers

557 search results - page 19 / 112
» Two experiences designing for effective security
Sort
View
CSCW
2012
ACM
12 years 4 months ago
Social visualization and negotiation: effects of feedback configuration and status
We describe a social visualization system that monitors the vocal arousal levels of the participants in a simulated twoparty employment negotiation. In a 3x2 factorial experiment ...
Michael Nowak, Juho Kim, Nam Wook Kim, Clifford Na...
SP
2010
IEEE
178views Security Privacy» more  SP 2010»
14 years 15 days ago
Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically
The computer systems security arms race between attackers and defenders has largely taken place in the domain of software systems, but as hardware complexity and design processes ...
Matthew Hicks, Murph Finnicum, Samuel T. King, Mil...
TPDS
2008
121views more  TPDS 2008»
13 years 8 months ago
Secure Collaboration in a Mediator-Free Distributed Environment
The internet and related technologies have made multidomain collaborations a reality. Collaboration enables domains to effectively share resources; however, it introduces several s...
Mohamed Shehab, Arif Ghafoor, Elisa Bertino
WWW
2010
ACM
14 years 3 months ago
Alhambra: a system for creating, enforcing, and testing browser security policies
Alhambra is a browser-based system designed to enforce and test web browser security policies. At the core of Alhambra is a policyenhanced browser supporting fine-grain security ...
Shuo Tang, Chris Grier, Onur Aciiçmez, Samu...
LCPC
2004
Springer
14 years 2 months ago
Power-Aware Scheduling for Parallel Security Processors with Analytical Models
Techniques to reduce power dissipation for embedded systems have recently come into sharp focus in the technology development. Among these techniques, dynamic voltage scaling (DVS)...
Yung-Chia Lin, Yi-Ping You, Chung-Wen Huang, Jenq ...