Sciweavers

791 search results - page 138 / 159
» Users and Trust in Cyberspace
Sort
View
PDCN
2004
13 years 9 months ago
Implementing a secure setuid program
Setuid programs are often exploited by malicious attackers to obtain unauthorized access to local systems. Setuid programs, especially owned by the root user, are granted root pri...
Takahiro Shinagawa, Kenji Kono
PDPTA
2004
13 years 9 months ago
On-demand Grid Storage Using Scavenging
Increasingly scientific discoveries are driven by analyses of massively distributed bulk data. This has led to the proliferation of high-end mass storage systems, storage area clu...
Sudharshan Vazhkudai
FIW
2000
114views Communications» more  FIW 2000»
13 years 9 months ago
Feature Interaction in Internet Telephony
While Internet telephony aims to provide services at least equal to traditional telephony, the architecture of Internet telephony is sufficiently different to make it necessary to ...
Jonathan Lennox, Henning Schulzrinne
AAAI
1996
13 years 9 months ago
The NASA Personnel Security Processing Expert System
The NASA Personnel Security Processing Expert System is a tool that automatically determines the appropriate personnel background investigation required for a civil servant or con...
David Silberberg, Robert Thomas
CHI
2008
ACM
13 years 8 months ago
Secrets and lies in computer-mediated interaction: theory, methods and design
The keeping of secrets and practicing of deception are commonplace in everyday social interaction. They also serve an important role in encouraging social cohesion. However, for H...
Adam N. Joinson, Jeffrey T. Hancock, Pamela Briggs