Sciweavers

2904 search results - page 322 / 581
» Internet Infrastructure Security
Sort
View
ITCC
2002
IEEE
15 years 9 months ago
Performance of Multimedia Applications with IPSec Tunneling
The concept of Virtual Private Networks offers a simple and cheap alternative to dedicated secure networks in corporate networks and Internet environments. The choice, however, of...
Samir Al-Khayatt, Siraj A. Shaikh, Babak Akhgar, J...
MMMACNS
2001
Springer
15 years 9 months ago
Analyzing Separation of Duties in Petri Net Workflows
Abstract. With the rise of global networks like the Internet the importance of workflow systems is growing. However, security questions in such environments often only address secu...
Konstantin Knorr, Harald Weidner
SPW
2001
Springer
15 years 9 months ago
On the Negotiation of Access Control Policies
Although the notion of negotiation has been used extensively in secure communication protocols to establish common keying states, protocol modes and services, this notion is only n...
Virgil D. Gligor, Himanshu Khurana, Radostina K. K...
INFOCOM
2000
IEEE
15 years 8 months ago
Windowed Certificate Revocation
Abstract--The advent of electronic commerce and personal communications on the Internet heightens concerns over the lack of privacy and security. Network services providing a wide ...
Patrick Drew McDaniel, Sugih Jamin
173
Voted
COMPSAC
2009
IEEE
15 years 2 months ago
Towards Usable Solutions to Graphical Password Hotspot Problem
Click based graphical passwords that use background images suffer from hot-spot problem. Previous graphical password schemes based on recognition of images do not have a sufficient...
Kemal Bicakci, Nart Bedin Atalay, Mustafa Yuceel, ...