Sciweavers

448 search results - page 52 / 90
» Who is in Control
Sort
View
124
Voted
CCS
2010
ACM
15 years 3 months ago
DIFC programs by automatic instrumentation
Decentralized information flow control (DIFC) operating systems provide applications with mechanisms for enforcing information-flow policies for their data. However, significant o...
William R. Harris, Somesh Jha, Thomas W. Reps
ISF
2006
118views more  ISF 2006»
15 years 3 months ago
Does information security attack frequency increase with vulnerability disclosure? An empirical analysis
Abstract Research in information security, risk management and investment has grown in importance over the last few years. However, without reliable estimates on attack probabiliti...
Ashish Arora, Anand Nandkumar, Rahul Telang
JITECH
2007
220views more  JITECH 2007»
15 years 3 months ago
Fixing the payment system at Alvalade XXI: a case on IT project risk management
This case describes the implementation and subsequent failure of an innovative system installed in the bars of Alvalade XXI, the recently built football stadium in Lisbon, Portuga...
Ramon O'Callaghan
131
Voted
ICDCS
1999
IEEE
15 years 8 months ago
Fault Tolerant Video on Demand Services
This paper describes a highly available distributedvideo on demand (VoD) service which is inherently fault tolerant. The VoD service is provided by multiple servers that reside at...
Tal Anker, Danny Dolev, Idit Keidar
CHI
2009
ACM
16 years 4 months ago
What's mine is mine: territoriality in collaborative authoring
Territoriality, the expression of ownership towards an object, can emerge when social actors occupy a shared social space. In the case of Wikipedia, the prevailing cultural norm i...
Jennifer Thom-Santelli, Dan Cosley, Geri Gay