Sciweavers

11 search results - page 3 / 3
» Exploitation of XML for Corporate Knowledge Management
Sort
View
ISW
2009
Springer
13 years 12 months ago
F3ildCrypt: End-to-End Protection of Sensitive Information in Web Services
The frequency and severity of a number of recent intrusions involving data theft and leakages has shown that online users’ trust, voluntary or not, in the ability of third partie...
Matthew Burnside, Angelos D. Keromytis