SecureWeb sites use HTTPS, which layers HTTP over SSL or its standard equivalent, TLS. Existing Web browsers handle security errors in a manner that often confuses users. In particular, when a user visits a secure site whose certificate the browser cannot verify, the browser typically allows the user to view and install the certificate and connect to the site despite the verification failure. However, few users understand the risk of man-in-the-middle attacks and the principles behind certificate-based authentication. This paper proposes Context-Sensitive Certificate Verification, whereby the browser interrogates the user about the context in which a certificate verification error occurs.
Online problems are popularly understood to be easily susceptible to offline legal categorizations and, thus, solutions. ""There is nothing new under the sun,"" people say to one another over and over again in the cyberlaw arena. But spyware appears to be an exception to this received world view. There is nothing quite like spyware in the ""Real"" world. This paper surveys the legislative landscape as of early 2005. The paper provides concrete suggestions for addressing spyware and asks: what is the legal role of these immunity networks?
Race continues to be a critical factor as one examines relationships in organizations, particularly if they are located in a U.S. based context. Race, is a socially embedded phenomenon that affects just about every aspect of lives, and as such, provides a critical lens with which to examine the mentoring literature. This research paper published by University of Pittsburgh explores how race has been positioned within the literature to provide a context for the review of how the mentoring literature has discussed race as a key factor.
In mobile environments, data dissemination is more challenging due to the limited, wireless bandwidth available for communication, frequent disconnections and low power withholding capacity of mobile devices. Mobile commerce is the next growing area in electronic commerce and mobile computing. These are sophisticated, data intensive mobile applications whose success strongly depends on the efficiency by which data are disseminated to a large number of mobile users. This paper proposes a new broadcast indexing scheme, termed ?Constant-Size I-node Distributed Indexing? (CI) that offers more energy savings in practical applications.