Sciweavers

826 search results - page 120 / 166
» Medical Requirements for Data Protection
Sort
View
OZCHI
2006
ACM
15 years 3 months ago
Question-based group authentication
There are various situations where a distinction needs to be made between group members and outsiders. For example, to protect students in chat groups from unpleasant incidents ca...
Ann Nosseir, Richard C. H. Connor, Karen Renaud
ESAS
2005
Springer
15 years 3 months ago
SKiMPy: A Simple Key Management Protocol for MANETs in Emergency and Rescue Operations
Mobile ad-hoc networks (MANETs) provide the technical platform for efficient information sharing in emergency and rescue operations. Some the data present on the scene is highly c...
Matija Puzar, Jon Andersson, Thomas Plagemann, Yve...
VLDB
2004
ACM
106views Database» more  VLDB 2004»
15 years 3 months ago
Vision Paper: Enabling Privacy for the Paranoids
P3P [23, 24] is a set of standards that allow corporations to declare their privacy policies. Hippocratic Databases [6] have been proposed to implement such policies within a corp...
Gagan Aggarwal, Mayank Bawa, Prasanna Ganesan, Hec...
DIM
2009
ACM
15 years 2 months ago
Using identity credential usage logs to detect anomalous service accesses
For e-commerce companies providing online services, fraudulent access resulting from theft of identity credentials is a serious concern. Such online service providers deploy a var...
Daisuke Mashima, Mustaque Ahamad
ISHPC
1999
Springer
15 years 2 months ago
Integrity and Performance in Network Attached Storage
Computer security is of growing importance in the increasingly networked computing environment.This work examines the issue of high-performance network security, specifically int...
Howard Gobioff, David Nagle, Garth A. Gibson