Sciweavers

1527 search results - page 262 / 306
» A Survey of Web Security
Sort
View
COMPSAC
2009
IEEE
15 years 3 months ago
On a Classification Approach for SOA Vulnerabilities
Abstract--Vulnerabilities in operating systems and web applications have been and are being put into various classifications, leading to a better understanding of their causes and ...
Lutz Lowis, Rafael Accorsi
CTRSA
2004
Springer
106views Cryptology» more  CTRSA 2004»
15 years 3 months ago
Improving Robustness of PGP Keyrings by Conflict Detection
Abstract. Secure authentication frequently depends on the correct recognition of a user's public key. When there is no certificate authority, this key is obtained from other u...
Qinglin Jiang, Douglas S. Reeves, Peng Ning
ATAL
2008
Springer
15 years 1 months ago
Agent-community-network-based business matching and collaboration support system
Business matching and collaboration support systems are useful, in particular for small-and-medium companies. Most of them developed so far are based on the server-client architect...
Tsunenori Mine, Kosaku Kimura, Satoshi Amamiya, Ke...
BIS
2008
86views Business» more  BIS 2008»
15 years 21 days ago
Specifying Separation of Duty Constraints in BPEL4People Processes
Abstract. Security issues have to be carefully considered for information systems that support the business processes of an organization, in particular, when these systems build on...
Jan Mendling, Karsten Ploesser, Mark Strembeck
LISA
2001
15 years 18 days ago
Crypto Blunders
Cryptography has emerged as an enormously important component of the networked world. People are hesitant to trust the World Wide Web and e-commerce without the protections crypto...
Steve Burnett