Sciweavers

1353 search results - page 96 / 271
» Securing Current and Future Process Control Systems
Sort
View
SP
1989
IEEE
160views Security Privacy» more  SP 1989»
15 years 7 months ago
The Chinese Wall Security Policy
Everyone who has seen the movie Wall Street will have seen a commercial security policy in action. The recent work of Clark and Wilson and the WIPCIS initiative (the Workshop on I...
D. F. C. Brewer, M. J. Nash
ESORICS
2012
Springer
13 years 5 months ago
Design and Implementation of a Terrorist Fraud Resilient Distance Bounding System
Abstract. Given the requirements of fast processing and the complexity of RF ranging systems, distance bounding protocols have been challenging to implement so far; only few design...
Aanjhan Ranganathan, Nils Ole Tippenhauer, Boris S...
CCS
2010
ACM
15 years 1 months ago
Adjustable autonomy for cross-domain entitlement decisions
Cross-domain information exchange is a growing problem, as business and governmental organizations increasingly need to integrate their information systems with those of partially...
Jacob Beal, Jonathan Webb, Michael Atighetchi
HICSS
2008
IEEE
107views Biometrics» more  HICSS 2008»
15 years 9 months ago
Research on Constraints in Anti-Money Laundering (AML) Business Process in China Based on Theory of Constraints
Anti-money laundering is a pressing issue in today’s economy. With the newly launched Chinese anti-money laundering regulation, this issue has drawn more and more attention from...
Xuan Liu, Pengzhu Zhang
HICSS
2002
IEEE
68views Biometrics» more  HICSS 2002»
15 years 8 months ago
Framing Virtual Interactivity between Government and Citizens: A Study of Feedback Systems in the Chicago Police Department
This paper considers the current efforts to describe the effect of Internet-based technology on interactivity between citizens and public organizations to be incomplete and poorly...
Shelley Fulla, Eric W. Welch