Sciweavers

448 search results - page 64 / 90
» Who is in Control
Sort
View
139
Voted
DBSEC
2003
149views Database» more  DBSEC 2003»
15 years 5 months ago
Anti-Tamper Databases: Querying Encrypted Databases
With mobile computing and powerful laptops, databases with sensitive data can be physically retrieved by malicious users who can employ techniques that were not previously thought...
Gultekin Özsoyoglu, David A. Singer, Sun S. C...
133
Voted
ISSA
2004
15 years 5 months ago
A Framework For Monitoring Insider Misuse Of It Applications
Many security incidents involve legitimate users who misuse their existing privileges, such that they have the system-level right to perform an action, but not the moral or ethica...
Aung Htike Phyo
142
Voted
ICSTM
2000
164views Management» more  ICSTM 2000»
15 years 5 months ago
Building Sustainable Interest in Modelling in the Classroom
System Dynamics has had a tough time breaking into High Schools. Like all good ideas the most difficult part is convincing those who would most benefit that this new approach is i...
Gordon Kubanek
120
Voted
WCE
2007
15 years 4 months ago
Human error of commission modeled with Theory of Games
— Industrial plants makes a carefully trace of the human intervention on the process. This intervention happens at different points in the history of the facility, since the desi...
Selva S. Rivera, Jorge E. Núñez Mc L...
125
Voted
CIE
2008
Springer
15 years 3 months ago
Designing new interfaces for digital interactive television usable by older adults
The adoption of digital television (DTV) could be particularly attractive for older people if appropriately designed. Despite this, when new services and applicat...
Mark Rice, Norman Alm