Sciweavers

1186 search results - page 67 / 238
» A New Approach to Secure Logging
Sort
View
127
Voted
WER
2005
Springer
15 years 6 months ago
Requirement Elicitation Based on Goals with Security and Privacy Policies in Electronic Commerce
This paper describes a method for requirements elicitation based on goals for electronic commerce systems in agreement with security and privacy polices of the site. The method in...
Simara Vieira da Rocha, Zair Abdelouahab, Eduardo ...
100
Voted
ISCC
2000
IEEE
15 years 5 months ago
Light Weight Security for Parallel Access to Multiple Mirror Sites
Mirror sites approach has been proposed recently for reducing the access delay and providing load balancing in network servers. In the mirror site approach a file, such as a multi...
Bülent Yener
XMLSEC
2003
ACM
15 years 5 months ago
A bitmap-based access control for restricted views of XML documents
The information on the web is growing at a very fast pace. In this ever-accumulating data, the volume of information represented in XML format is on the rise in recent times. An o...
Abhilash Gummadi, Jong P. Yoon, Biren Shah, Vijay ...
124
Voted
IACR
2011
104views more  IACR 2011»
14 years 5 days ago
Short Transitive Signatures for Directed Trees
A transitive signature scheme allows to sign a graph in such a way that, given the signatures of edges (a, b) and (b, c), it is possible to compute the signature for the edge (or ...
Philippe Camacho, Alejandro Hevia
107
Voted
HICSS
2002
IEEE
107views Biometrics» more  HICSS 2002»
15 years 5 months ago
Insurability of Electronic Commerce Risks
New kinds of risks increasingly threaten electronic commerce. The traditional instrument for risk transfer is insurance. Research is needed to determine whether new Internet risks...
Torsten Grzebiela