Sciweavers

2429 search results - page 129 / 486
» Using Aspects to Design a Secure System
Sort
View
SIGCSE
2009
ACM
168views Education» more  SIGCSE 2009»
14 years 9 months ago
Bringing big systems to small schools: distributed systems for undergraduates
Distributed applications have become a core component of the Internet's infrastructure. However, many undergraduate curriculums, especially at small colleges, do not offer co...
Jeannie R. Albrecht
EGOV
2006
Springer
14 years 26 days ago
Evaluation of E-Government Systems: Project Assessment vs Development Assessment
Abstract. Most reported literature on evaluation of e-government systems tend to focus on narrow aspects of project design and implementation. The larger context of development and...
Rahul De'
RR
2007
Springer
14 years 3 months ago
Proof Explanation in the DR-DEVICE System
Trust is a vital feature for the Semantic Web: If users (humans and agents) are to use and integrate system answers, they must trust them. Thus, systems should be able to explain t...
Nick Bassiliades, Grigoris Antoniou, Guido Governa...
CCS
2007
ACM
14 years 3 months ago
Uclinux: a linux security module for trusted-computing-based usage controls enforcement
Usage controls allow the distributor of some information to limit how recipients of that information may use it. The Trusted Computing Group has standardized Trusted Platform Modu...
David Kyle, José Carlos Brustoloni
CCS
2007
ACM
14 years 3 months ago
An independent audit framework for software dependent voting systems
The electronic voting machines known as Direct Recording Electronic (DRE), that are used in many states in the US have been shown to contain security vulnerabilities [16, 9, 3]. O...
Sujata Garera, Aviel D. Rubin