Sciweavers

1186 search results - page 117 / 238
» A New Approach to Secure Logging
Sort
View
88
Voted
COMPSEC
2002
185views more  COMPSEC 2002»
15 years 14 days ago
A framework for understanding and predicting insider attacks
In this paper an insider attack is considered to be deliberate misuse by those who are authorized to use computers and networks. Applying this definition in real-life settings to ...
E. Eugene Schultz
118
Voted
POPL
2012
ACM
13 years 8 months ago
Multiple facets for dynamic information flow
JavaScript has become a central technology of the web, but it is also the source of many security problems, including cross-site scripting attacks and malicious advertising code. ...
Thomas H. Austin, Cormac Flanagan
NDSS
2002
IEEE
15 years 5 months ago
Advanced Client/Server Authentication in TLS
Many business transactions on the Internet occur between strangers, that is, between entities with no prior relationship and no common security domain. Traditional security approa...
Adam Hess, Jared Jacobson, Hyrum Mills, Ryan Wamsl...
113
Voted
ICUIMC
2011
ACM
14 years 4 months ago
MundoMessage: enabling trustworthy ubiquitous emergency communication
Efficient emergency communication is of high practical importance, but has specific challenges: unpredictable local emergency situations harden the establishment of communication...
Stefan G. Weber, Yulian Kalev, Sebastian Ries, Max...
104
Voted
HICSS
2008
IEEE
155views Biometrics» more  HICSS 2008»
15 years 7 months ago
Pseudonymization for improving the Privacy in E-Health Applications
— Electronic health records (EHR) promise to improve communication between health care providers, thus leading to better quality of patients’ treatment and reduced costs. As hi...
Bernhard Riedl, Veronika Grascher, Stefan Fenz, Th...