Sciweavers

1527 search results - page 99 / 306
» A Survey of Web Security
Sort
View
BPSC
2009
184views Business» more  BPSC 2009»
15 years 23 days ago
Generating WS-SecurityPolicy Documents via Security Model Transformation
Abstract: When SOA-based business processes are to be enhanced with security properties, the model-driven business process development approach enables an easier and more reliable ...
Meiko Jensen
JOT
2006
80views more  JOT 2006»
14 years 11 months ago
Remote Job Submission Security
This paper presents the middleware needed to deploy jobs to non-geographically colocated clusters with decentralized look-up severs. We have named our framework the Initium Remote...
Pawel Krepsztul, Douglas A. Lyon
ICC
2009
IEEE
122views Communications» more  ICC 2009»
15 years 6 months ago
Sensitive Data Requests: Do Sites Ask Correctly?
— To ensure the security of sensitive Web content, an organization must use TLS and do so correctly. However, little is known about how TLS is actually used on the Web. In this w...
Craig A. Shue, Minaxi Gupta
CHI
2006
ACM
16 years 1 days ago
Keeping up appearances: understanding the dimensions of incidental information privacy
We conducted a survey of 155 participants to examine privacy concerns relating to the viewing of incidental information (i.e. traces of previous activity unrelated to the task at ...
Kirstie Hawkey, Kori M. Inkpen
ECIS
2003
15 years 1 months ago
The impact of prior online shopping experience on future purchasing channel choice
This paper discusses the direct and indirect effects of online shopping experience on selecting and the intention to select the Internet as the purchasing channel. The theoretical...
Jonna Järveläinen