Sciweavers

729 search results - page 2 / 146
» Towards Secure e-Services
Sort
View
FSKD
2006
Springer
125views Fuzzy Logic» more  FSKD 2006»
13 years 9 months ago
Towards Security Evaluation Based on Evidence Collection
Information security evaluation of software-intensive systems typically relies heavily on the experience of the security professionals. Obviously, automated approaches are needed ...
Reijo Savola
CODASPY
2012
12 years 1 months ago
Towards end-to-end secure content storage and delivery with public cloud
Recent years have witnessed the trend of leveraging cloudbased services for large scale content storage, processing, and distribution. Security and privacy are among top concerns ...
Huijun Xiong, Xinwen Zhang, Danfeng Yao, Xiaoxin W...
EUROCRYPT
2011
Springer
12 years 8 months ago
Towards a Game Theoretic View of Secure Computation
Gilad Asharov, Ran Canetti, Carmit Hazay
CCS
2007
ACM
13 years 11 months ago
Towards a taxonomy for information security metrics
Systematic approaches to measuring security are needed in order to obtain evidence of the security performance of products or an organization. In this study we survey the emerging...
Reijo Savola