Sciweavers

1154 search results - page 121 / 231
» Making Self-organizing Systems Secure
Sort
View
106
Voted
ACSAC
2010
IEEE
14 years 11 months ago
FIRM: capability-based inline mediation of Flash behaviors
The wide use of Flash technologies makes the security risks posed by Flash content an increasingly serious issue. Such risks cannot be effectively addressed by the Flash player, w...
Zhou Li, XiaoFeng Wang
CCS
2010
ACM
15 years 1 months ago
Hierarchical attribute-based encryption for fine-grained access control in cloud storage services
Cloud computing, as an emerging computing paradigm, enables users to remotely store their data into a cloud so as to enjoy scalable services on-demand. Especially for small and me...
Guojun Wang, Qin Liu, Jie Wu
87
Voted
WIKIS
2009
ACM
15 years 8 months ago
Experience report - Wiki for law firms
This paper shows the experiences of a law firm with adopting Wiki Webs for knowledge management and collaboration over the last two years. Wikis created a business advantage for t...
Urs Egli, Peter Sommerlad
HICSS
2007
IEEE
95views Biometrics» more  HICSS 2007»
15 years 7 months ago
Protecting with Sensor Networks: Attention and Response
Sensor networks are expected to play an important role in hybrid protection infrastructures when combined with robots and human decision makers. In order to be effective, detectio...
Jeffrey V. Nickerson, Stephan Olariu
EUC
2005
Springer
15 years 7 months ago
Program Obfuscation Scheme Using Random Numbers to Complicate Control Flow
Abstract. For the security technology that has been achieved with software in the computer system and the protection of the intellectual property right of software, software protec...
Tatsuya Toyofuku, Toshihiro Tabata, Kouichi Sakura...