Sciweavers

581 search results - page 59 / 117
» policy 2009
Sort
View
CCS
2009
ACM
14 years 9 months ago
Confidentiality-preserving distributed proofs of conjunctive queries
Distributed proof construction protocols have been shown to be valuable for reasoning about authorization decisions in open distributed environments such as pervasive computing sp...
Adam J. Lee, Kazuhiro Minami, Nikita Borisov
ACSAC
2009
IEEE
14 years 3 months ago
Semantically Rich Application-Centric Security in Android
—Smartphones are now ubiquitous. However, the security requirements of these relatively new systems and the applications they support are still being understood. As a result, the...
Machigar Ongtang, Stephen E. McLaughlin, William E...
HICSS
2009
IEEE
195views Biometrics» more  HICSS 2009»
14 years 3 months ago
Cyber Migration: An Empirical Investigation on Factors that Affect Users' Switch Intentions in Social Networking Sites
In recent years, Social Networking Sites (SNSs) have increasingly gained popularity. With the existence of hundreds of such sites, it is not uncommon to have users switching betwe...
Zengyan Cheng, Yinping Yang, John Lim
HICSS
2009
IEEE
107views Biometrics» more  HICSS 2009»
14 years 3 months ago
EM Enforcing Information Flow Properties using Compensating Events
Deeply embedded infrastructures are pervasive systems that have significant cyber and physical components, interacting with each other in complex ways. These interactions can vio...
Thoshitha T. Gamage, Bruce M. McMillin
HICSS
2009
IEEE
99views Biometrics» more  HICSS 2009»
14 years 3 months ago
Local-Global: Reconciling Mismatched Ontologies in Development Information Systems
This paper extends pre-existing digital divide conceptualizations to further investigate the important issue of mismatches between the ontologies of state-created information syst...
Jessica Seddon Wallack, Ramesh Srinivasan