Sciweavers

791 search results - page 125 / 159
» Users and Trust in Cyberspace
Sort
View
OSDI
2008
ACM
14 years 8 months ago
Hardware Enforcement of Application Security Policies Using Tagged Memory
Computers are notoriously insecure, in part because application security policies do not map well onto traditional protection mechanisms such as Unix user accounts or hardware pag...
Nickolai Zeldovich, Hari Kannan, Michael Dalton, C...
SIGUCCS
2000
ACM
13 years 12 months ago
Linux and Open Source in the Academic Enterprise
Open Source Software (OSS) has made great strides toward mainstream acceptance over the past two years. However, many IT managers, both in business and academia, are still cautiou...
Mike Davis, Will O'Donovan, John Fritz, Carlisle C...
ACMICEC
2007
ACM
303views ECommerce» more  ACMICEC 2007»
13 years 11 months ago
Impact of social influence in e-commerce decision making
Purchasing decisions are often strongly influenced by people who the consumer knows and trusts. Moreover, many online shoppers tend to wait for the opinions of early adopters befo...
Young Ae Kim, Jaideep Srivastava
CCS
2006
ACM
13 years 11 months ago
TCG inside?: a note on TPM specification compliance
The Trusted Computing Group (TCG) has addressed a new generation of computing platforms employing both supplemental hardware and software with the primary goal to improve the secu...
Ahmad-Reza Sadeghi, Marcel Selhorst, Christian St&...
CORR
2006
Springer
113views Education» more  CORR 2006»
13 years 7 months ago
Secure Positioning of Mobile Terminals with Simplex Radio Communication
With the rapid spread of various mobile terminals in our society, the importance of secure positioning is growing for wireless networks in adversarial settings. Recently, several ...
Mikio Fujii