Sciweavers

364 search results - page 9 / 73
» Privacy Requirements Implemented with a JavaCard
Sort
View
CSE
2009
IEEE
15 years 2 months ago
Privacy-Enhanced Event Scheduling
—Event schedulers, well-known from groupware and social software, typically share the problem that they disclose detailed availability patterns of their users. This paper disting...
Benjamin Kellermann, Rainer Böhme
ICAIL
2007
ACM
15 years 1 months ago
How to capture, model, and verify the knowledge of legal, security, and privacy experts: a pattern-based approach
Laws set requirements that force organizations to assess the security and privacy of their IT systems and impose the adoption of the implementation of minimal precautionary securi...
Luca Compagna, Paul El Khoury, Fabio Massacci, Res...
ESORICS
2006
Springer
15 years 1 months ago
SessionSafe: Implementing XSS Immune Session Handling
With the growing trend towards the use of web applications the danger posed by cross site scripting vulnerabilities gains severity. The most serious threats resulting from cross si...
Martin Johns
ACSAC
2005
IEEE
15 years 3 months ago
Design and Implementation of an Extrusion-based Break-In Detector for Personal Computers
An increasing variety of malware, such as worms, spyware and adware, threatens both personal and business computing. Remotely controlled bot networks of compromised systems are gr...
Weidong Cui, Randy H. Katz, Wai-tian Tan
NETWORKING
2007
14 years 11 months ago
Privacy-Aware Multi-Context RFID Infrastructure Using Public Key Cryptography
We propose a novel approach in designing an RFID infrastructure which foresees the usage of a single RFID tag within different contexts and for multiple purposes. We regard privacy...
Selim Volkan Kaya, Erkay Savas, Albert Levi, Ö...