Sciweavers

79 search results - page 4 / 16
» The Effect of Trust Assumptions on the Elaboration of Securi...
Sort
View
IJMI
2002
142views more  IJMI 2002»
13 years 5 months ago
Quality assured trusted third parties for deploying secure internet-based healthcare applications
In this paper we present a complete reference framework for the provision of quality assured Trusted Third Party (TTP) services within a medical environment. The main objective is...
Dimitrios Lekkas, Stefanos Gritzalis, Sokratis K. ...
SACMAT
2003
ACM
13 years 11 months ago
Dynamic access control: preserving safety and trust for network defense operations
We investigate the cost of changing access control policies dynamically as a response action in computer network defense. We compare and contrast the use of access lists and capab...
Prasad Naldurg, Roy H. Campbell
IEEEHPCS
2010
13 years 4 months ago
Security, trust and risk in Digital Rights Management ecosystem
In the last decades, Digital Rights Management (DRM) technology has been laid emphasis on digital contents protection and related security policies, mechanisms and implementation....
Zhiyong Zhang
NSPW
2004
ACM
13 years 11 months ago
A collaborative approach to autonomic security protocols
This paper considers a new security protocol paradigm whereby principals negotiate and on-the-fly generate security protocols according to their needs. When principals wish to in...
Hongbin Zhou, Simon N. Foley
ISSA
2004
13 years 7 months ago
Utilizing Neural Networks For Effective Intrusion Detection
Computer security, and intrusion detection in particular, has become increasingly important in today's business environment, to help ensure safe and trusted commerce between ...
Martin Botha