Sciweavers

316 search results - page 17 / 64
» Where do security policies come from
Sort
View
IJLT
2006
85views more  IJLT 2006»
13 years 7 months ago
Job aids and performance support: the convergence of learning and work
: Performance support is happening where we work and live. Under a tree and at a park bench, in a submarine, at a parent-teacher meeting, in a cubicle, or on the manufacturing floo...
Allison Rossett, Lisa Schafer
HICSS
2002
IEEE
116views Biometrics» more  HICSS 2002»
14 years 17 days ago
E-commerce Security Issues
Without trust, most prudent business operators and clients may decide to forgo use of the Internet and revert back to traditional methods of doing business. To counter this trend,...
Randy C. Marchany, Joseph G. Tront
NDSS
2003
IEEE
14 years 27 days ago
Fighting Spam by Encapsulating Policy in Email Addresses
Everyday network interactions require users to give out their email address, yet no guarantees can be made about how this address will be used. Sometimes the address is given to a...
John Ioannidis
NSPW
2004
ACM
14 years 1 months ago
Symmetric behavior-based trust: a new paradigm for internet computing
Current models of Internet Computing are highly asymmetric – a host protects itself from malicious mobile Java programs, but there is no way to get assurances about the behavior...
Vivek Haldar, Michael Franz
TSP
2008
117views more  TSP 2008»
13 years 7 months ago
A Theory for Sampling Signals From a Union of Subspaces
One of the fundamental assumptions in traditional sampling theorems is that the signals to be sampled come from a single vector space (e.g. bandlimited functions). However, in many...
Yue M. Lu, Minh N. Do