Sciweavers

2363 search results - page 73 / 473
» How Secure is RFID
Sort
View
AICT
2006
IEEE
128views Communications» more  AICT 2006»
15 years 10 months ago
Providing Secure Services in Peer-to-Peer Communications Networks with Central Security Servers
IP Telephony based on Peer-to-Peer (P2P) technology has being gaining attentions for its innovative approach to providing VoIP service. At the same time, it has raised many new re...
Feng Cao, David A. Bryan, Bruce Lowekamp
ETFA
2005
IEEE
15 years 10 months ago
A security architecture for data privacy and security
Data access and software exchange are often achieved over insecure networks such as the public Internet. System designers are therefore forced to be proactive with regard to verif...
Alfred C. Weaver
ESORICS
2002
Springer
16 years 4 months ago
Authentication for Distributed Web Caches
We consider the problem of offloading secure access-controlled content from central origin servers to distributed caches so clients can access a proximal cache rather than the orig...
James Giles, Reiner Sailer, Dinesh C. Verma, Sures...
NSPW
2006
ACM
15 years 10 months ago
E-Prime for security: a new security paradigm
This paper details a true and striking paradigm shift: the use of E-Prime for (at least) user-centered security, organizational/enterprise security policies and informal security ...
Steven J. Greenwald
101
Voted
CAISE
2004
Springer
15 years 9 months ago
Secure Databases: An Analysis of Clark-Wilson Model in a Database Environment
Abstract. Information systems are vulnerable to accidental or malicious attacks. Security models for commercial computer systems exist, but information systems security is often ig...
Xiaocheng Ge, Fiona Polack, Régine Laleau