Sciweavers

163 search results - page 19 / 33
» What Instills Trust
Sort
View
ITNG
2007
IEEE
14 years 1 months ago
Practical Challenges Facing Communities of Interest in the Net-Centric Department of Defense
The United States Department of Defense (DoD) – one of the world’s largest heterogeneous and distributed enterprises – is transforming its information management and sharing...
C. L. Connors, M. A. Malloy
MOBILITY
2009
ACM
14 years 2 days ago
Context-sensitive authorization in interaction patterns
Main requirement of recent computing environments, like mobile and then ubiquitous computing, is to adapt applications to context. On the other hand, access control generally trus...
Vincent Hourdin, Jean-Yves Tigli, Stephane Lavirot...
FGCS
2006
101views more  FGCS 2006»
13 years 7 months ago
Evaluating architectures for independently auditing service level agreements
Web and grid services are quickly maturing as a technology that allows for the integration of applications belonging to different administrative domains, enabling much faster and ...
Ana Carolina Barbosa, Jacques Philippe Sauvé...
COMPUTER
2004
120views more  COMPUTER 2004»
13 years 7 months ago
Computer Security in the Real World
After thirty years of work on computer security, why are almost all the systems in service today extremely vulnerable to attack? The main reason is that security is expensive to s...
Butler W. Lampson
CHI
2005
ACM
14 years 7 months ago
A study of preferences for sharing and privacy
We describe studies of preferences about information sharing aimed at identifying fundamental concerns with and at understanding how people might abstract the details of sharing i...
Judith S. Olson, Jonathan Grudin, Eric Horvitz