Sciweavers

791 search results - page 69 / 159
» Users and Trust in Cyberspace
Sort
View
PDP
2008
IEEE
14 years 2 months ago
CoDaMine: Communication Data Mining for Feedback and Control in Ubiquitous Environments
In ubiquitous environments an increasing number of sensors capture information on users and an increasing number of actuators present information to users. In this paper we presen...
Tom Gross, Mirko Fetter
IEEEIAS
2008
IEEE
14 years 2 months ago
A Device Management Framework for Secure Ubiquitous Service Delivery
In a mobile ubiquitous environment, service interactions between a user device and a service provider should be secure, regardless of the type of device used to access or consume ...
Adrian Leung, Chris J. Mitchell
PST
2008
13 years 9 months ago
An Access Control Scheme for Protecting Personal Data
This paper presents a new personal data access control (PDAC) scheme that is inspired by the protection schemes practiced in communities for sharing valuable commodities. The PDAC...
Wilfred Villegas, Bader Ali, Muthucumaru Maheswara...
AINA
2007
IEEE
14 years 2 months ago
Kernel and Application Integrity Assurance: Ensuring Freedom from Rootkits and Malware in a Computer System
Malware and rootkits are serious security vulnerabilities, and they can be designed to be resistant to anti-viral software, or even totally undetectable. This paper described a hi...
Lifu Wang, Partha Dasgupta
ETFA
2005
IEEE
14 years 1 months ago
A security architecture for data privacy and security
Data access and software exchange are often achieved over insecure networks such as the public Internet. System designers are therefore forced to be proactive with regard to verif...
Alfred C. Weaver