Sciweavers

5273 search results - page 208 / 1055
» Secured Web Access
Sort
View
DOLAP
2000
ACM
15 years 9 months ago
Towards OLAP Security Design - Survey and Research Issues
With the use of data warehousing and online analytical processing (OLAP) for decision support applications new security issues arise. The goal of this paper is to introduce an OLA...
Torsten Priebe, Günther Pernul
ELPUB
2008
ACM
15 years 6 months ago
Open Access Citation Rates and Developing Countries
Academics, having written their peer reviewed articles, may at some stage in the make their work Open Access (OA). They can do this by self-archiving an electronic version of thei...
Michael Norris, Charles Oppenheim, Fytton Rowland
CAINE
2008
15 years 6 months ago
Integrated Accessibility Models of User Interfaces for IT and Automation Systems
The difference between user interfaces of computer and Web applications on one hand and the interfaces of actual machines and devices is becoming smaller. By this the importance o...
Peter Göhner, Simon Kunz, Sabina Jeschke, Hel...
CCS
2007
ACM
15 years 10 months ago
Beamauth: two-factor web authentication with a bookmark
We propose BeamAuth, a two-factor web authentication technique where the second factor is a specially crafted bookmark. BeamAuth presents two interesting features: (1) only server...
Ben Adida
IMA
2005
Springer
85views Cryptology» more  IMA 2005»
15 years 10 months ago
The Physically Observable Security of Signature Schemes
In recent years much research has been devoted to producing formal models of security for cryptographic primitives and to designing schemes that can be proved secure in such models...
Alexander W. Dent, John Malone-Lee