Nothing Special   »   [go: up one dir, main page]

skip to main content
Volume 49, Issue 9September 2006Privacy and security in highly dynamic systems
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
ISSN:0001-0782
EISSN:1557-7317
Published In:
cacm
Reflects downloads up to 10 Nov 2024Bibliometrics
Skip Table Of Content Section
COLUMN: The business of software
article
Free
Software: hard data

Seeking solid information on the behavior of modern projects.

COLUMN: Staying connected
article
Free
Home turf

Service providers are building their networks right to your door---that is, your den, your bedroom, and your kitchen.

COLUMN: Viewpoint
article
Free
Wireless laptops in the classroom (and the Sesame Street syndrome)

Give instructors the option of turning off wireless Web access to accommodate their students' learning styles, in some cases to save them from themselves.

SPECIAL ISSUE: Privacy and security in highly dynamic systems
article
Free
article
Free
Personalization in privacy-aware highly dynamic systems

Enabling novel ways to personalize the relationship with customers without sacrificing their privacy.

article
Free
Distributed usage control

Using a server-side architecture to connect specialized enforcement mechanisms with usage control requirements and policies.

article
Free
Externally verifiable code execution

Using hardware- and software-based techniques to realize a primitive for externally verifiable code execution.

article
Free
Perspectives for cryptographic long-term security

Cryptographic long-term security is needed, but difficult to achieve. Use flexible cryptographic tools, and have replacements ready.

article
Free
Legal programming

Using a process modeling-based approach to address privacy and related legal issues arising in an RFID-based augmented reality shopping situation.

COLUMN: A Wiki for discussing and promoting best practices in research
article
Free
A Wiki for discussing and promoting best practices in research

Dealing with the demands of escalating paper submissions is a daunting challenge for conference organizers and program chairs. ACM and IEEE have joined forces to create a forum for sharing ideas on the best ways to handle it all.

article
Free
What is your software worth?

By applying well-known principlesof intellectual property valuation,sales expectations, growth of maintained software, discounting to present value, and the like, a method is presented for valuingsoftware based on the income that use of the softwareis ...

article
Free
Tapping the power of text mining

Sifting through vast collections of unstructured or semistructured data beyond the reach of data mining tools, text mining tracks information sources, links isolated concepts in distant documents, maps relationships between activities, and helps answer ...

article
Free
Polaris: virus-safe computing for Windows XP

It limits the damage a virus can do by using the operating system's own security mechanisms to enforce the Principle of Least Authority on individual applications.

article
Free
Mobile data service fuels the desire for uniqueness

Mobile content creators and service providers can leverage users' desire to be unique to expand revenue.

article
Free
Asian trio's adoption of Linux-based open source development

Three Asian economic heavyweights---China, Japan, and South Korea---join IT forces.

Subjects

Comments

Please enable JavaScript to view thecomments powered by Disqus.