Sciweavers

2403 search results - page 4 / 481
» Cyberinsurance in IT Security Management
Sort
View
SOUPS
2009
ACM
15 years 3 months ago
A multi-method approach for user-centered design of identity management systems
Pooya Jaferian, David Botta, Kirstie Hawkey, Konst...
SP
2003
IEEE
104views Security Privacy» more  SP 2003»
15 years 2 months ago
Beyond Proof-of-Compliance: Safety and Availability Analysis in Trust Management
Ninghui Li, William H. Winsborough, John C. Mitche...
CCS
2001
ACM
15 years 1 months ago
Privacy Engineering for Digital Rights Management Systems
Joan Feigenbaum, Michael J. Freedman, Tomas Sander...
CCS
2001
ACM
15 years 1 months ago
Distributed credential chain discovery in trust management: extended abstract
Ninghui Li, William H. Winsborough, John C. Mitche...
ACSAC
1999
IEEE
15 years 1 months ago
Toward a Taxonomy and Costing Method for Security Services
A wide range of security services may be available to applications in a heterogeneous computer network environment. Resource Management Systems (RMSs) responsible for assigning co...
Cynthia E. Irvine, Timothy E. Levin