Sciweavers

3349 search results - page 52 / 670
» Data Security
Sort
View
CSREASAM
2009
14 years 11 months ago
Security Level Determination Using Branes for Contextual Based Global Processing: An Architecture
This paper presents the basics of a new paradigm that allows generators and consumers of global contextual information to determine an appropriate security level needed for contex...
Greg Vert, Evangelos Triantaphyllou
CAISE
2004
Springer
15 years 3 months ago
Secure Databases: An Analysis of Clark-Wilson Model in a Database Environment
Abstract. Information systems are vulnerable to accidental or malicious attacks. Security models for commercial computer systems exist, but information systems security is often ig...
Xiaocheng Ge, Fiona Polack, Régine Laleau
SEC
2008
14 years 11 months ago
ASTRA : A Security Analysis Method Based on Asset Tracking
ASTRA is a security analysis method based on the systematic collection and analysis of security relevant information to detect inconsistencies and assess residual risks. ASTRA can ...
Daniel Le Métayer, Claire Loiseaux
ACSAC
2007
IEEE
15 years 4 months ago
Extending the Java Virtual Machine to Enforce Fine-Grained Security Policies in Mobile Devices
The growth of the applications and services market for mobile devices is currently slowed down by the lack of a flexible and reliable security infrastructure. The development and...
Iulia Ion, Boris Dragovic, Bruno Crispo
SASN
2004
ACM
15 years 3 months ago
Resilient aggregation in sensor networks
This paper studies security for data aggregation in sensor networks. Current aggregation schemes were designed without security in mind and there are easy attacks against them. We...
David Wagner