Sciweavers

791 search results - page 64 / 159
» Users and Trust in Cyberspace
Sort
View
WWIC
2010
Springer
183views Communications» more  WWIC 2010»
14 years 22 days ago
Enhanced Mobility Support for Roaming Users: Extending the IEEE 802.21 Information Service
Many cell-phones and Personal Digital Assistants (PDAs) are equipped with multiple radio interfaces. Because of this, devices need to have ways of efficiently selecting the most su...
Karl Andersson, Andrea G. Forte, Henning Schulzrin...
RR
2007
Springer
14 years 1 months ago
Proof Explanation in the DR-DEVICE System
Trust is a vital feature for the Semantic Web: If users (humans and agents) are to use and integrate system answers, they must trust them. Thus, systems should be able to explain t...
Nick Bassiliades, Grigoris Antoniou, Guido Governa...
APCSAC
2003
IEEE
14 years 1 months ago
User-Level Management of Kernel Memory
Abstract. Kernel memory is a resource that must be managed carefully in order to ensure the efficiency and safety of the system. The use of an inappropriate management policy can w...
Andreas Haeberlen, Kevin Elphinstone
ICSE
2003
IEEE-ACM
14 years 7 months ago
The Grand Challenge of Trusted Components
Reusable components equipped with strict guarantees of quality can help reestablish software development on a stronger footing, by taking advantage of the scaling effect of reuse ...
Bertrand Meyer
CCS
2005
ACM
14 years 1 months ago
Preventing attribute information leakage in automated trust negotiation
Automated trust negotiation is an approach which establishes trust between strangers through the bilateral, iterative disclosure of digital credentials. Sensitive credentials are ...
Keith Irwin, Ting Yu