Sciweavers

5273 search results - page 169 / 1055
» Secured Web Access
Sort
View
CCS
2008
ACM
15 years 6 months ago
Enforcing a security pattern in stakeholder goal models
Patterns are useful knowledge about recurring problems and solutions. Detecting a security problem using patterns in requirements models may lead to its early solution. In order t...
Yijun Yu, Haruhiko Kaiya, Hironori Washizaki, Ying...
CORR
2011
Springer
239views Education» more  CORR 2011»
14 years 11 months ago
From Linked Data to Relevant Data -- Time is the Essence
The Semantic Web initiative puts emphasis not primarily on putting data on the Web, but rather on creating links in a way that both humans and machines can explore the Web of data...
Markus Kirchberg, Ryan K. L. Ko, Bu Sung Lee
NORDSEC
2009
Springer
15 years 11 months ago
Facilitating the Adoption of Tor by Focusing on a Promising Target Group
The technology for anonymous communication has been thoroughly researched. But despite the existence of several protection services, a business model for anonymous web surfing has ...
Heiko Roßnagel, Jan Zibuschka, Lexi Pimenidi...
SIGCOMM
2012
ACM
13 years 7 months ago
Signposts: end-to-end networking in a world of middleboxes
This demo presents Signposts, a system to provide users with a secure, simple mechanism to establish and maintain communication channels between their personal cloud of named devi...
Amir Chaudhry, Anil Madhavapeddy, Charalampos Rots...
WWW
2009
ACM
16 years 5 months ago
What's up CAPTCHA?: a CAPTCHA based on image orientation
We present a new CAPTCHA which is based on identifying an image's upright orientation. This task requires analysis of the often complex contents of an image, a task which hum...
Rich Gossweiler, Maryam Kamvar, Shumeet Baluja