Sciweavers

581 search results - page 108 / 117
» policy 2009
Sort
View
HICSS
2009
IEEE
96views Biometrics» more  HICSS 2009»
14 years 2 months ago
The Potential of Renewable Energy to Reduce the Dependence of the State of Hawaii on Oil
Deriving nearly 90% of its primary energy resources from oil, the State of Hawaii is more dependent on oil than any other U.S. state. The price of electricity in Hawaii is also mo...
Doug Arent, John Barnett, Gail Mosey, Alison Wise
IEEEARES
2009
IEEE
14 years 2 months ago
Generating User-Understandable Privacy Preferences
—Making use of the World Wide Web’s numerous services increasingly requires the disclosure of personal user data. While these data represent an important value for service prov...
Jan Kolter, Günther Pernul
IEEEARES
2009
IEEE
14 years 2 months ago
Defeating Dynamic Data Kernel Rootkit Attacks via VMM-Based Guest-Transparent Monitoring
—Targeting the operating system kernel, the core of trust in a system, kernel rootkits are able to compromise the entire system, placing it under malicious control, while eluding...
Junghwan Rhee, Ryan Riley, Dongyan Xu, Xuxian Jian...
IDTRUST
2009
ACM
14 years 2 months ago
Usable trust anchor management
Security in browsers is based upon users trusting a set of root Certificate Authorities (called Trust Anchors) which they may know little or nothing about. Browser vendors face a...
Massimiliano Pala, Scott A. Rea
PLDI
2009
ACM
14 years 2 months ago
Staged information flow for javascript
Modern websites are powered by JavaScript, a flexible dynamic scripting language that executes in client browsers. A common paradigm in such websites is to include third-party Ja...
Ravi Chugh, Jeffrey A. Meister, Ranjit Jhala, Sori...