Sciweavers

3149 search results - page 147 / 630
» IT security risk management
Sort
View
77
Voted
DIM
2006
ACM
15 years 4 months ago
Securing user inputs for the web
Jan Camenisch, Abhi Shelat, Dieter Sommer, Roger Z...
102
Voted
ESSOS
2009
Springer
15 years 7 months ago
Idea: Trusted Emergency Management
Through first-responder access to sensitive information for which they have not been pre-vetted, lives and property can be saved. We describe enhancements to a trusted emergency i...
Timothy E. Levin, Cynthia E. Irvine, Terry Benzel,...
CMS
1996
167views Communications» more  CMS 1996»
15 years 2 months ago
Anonymous Mobility Management for Third Generation Mobile Networks
With the increasing use of mobile and nomadic communication devices requirements for security and privacy are rising as well. Following brief surveys of existing approaches to mob...
Simon Hoff, Kai Jakobs, Dogan Kesdogan
85
Voted
INAP
2001
Springer
15 years 5 months ago
Content-based Management of Document Access Control
Three different security models have been advocated to determine the access rights to documents in a network of computers; DAC, MLS, and RBAC. Each of these models has its strengt...
Edgar Weippl, Ismail Khalil Ibrahim, Werner Winiwa...
106
Voted
TISSEC
2002
82views more  TISSEC 2002»
15 years 12 days ago
Trust management for IPsec
IPsec is the standard suite of protocols for networklayer confidentiality and authentication of Internet traffic. The IPsec protocols, however, do not address the policies for how...
Matt Blaze, John Ioannidis, Angelos D. Keromytis