Sciweavers

2560 search results - page 100 / 512
» Securing VO Management
Sort
View
CCS
2008
ACM
15 years 6 months ago
Stale-safe security properties for group-based secure information sharing
Attribute staleness arises due to the physical distribution of authorization information, decision and enforcement points. This is a fundamental problem in virtually any secure di...
Ram Krishnan, Jianwei Niu, Ravi S. Sandhu, William...
ACMICEC
2006
ACM
112views ECommerce» more  ACMICEC 2006»
15 years 10 months ago
Persistent information security: beyond the e-commerce threat model
This paper introduces a new class of information security solution. The core technology, to authorize and track the use of digital files, was originally developed in eCommerce app...
Merv Matson, Mihaela Ulieru
ESORICS
2010
Springer
15 years 5 months ago
Kamouflage: Loss-Resistant Password Management
We introduce Kamouflage: a new architecture for building theft-resistant password managers. An attacker who steals a laptop or cell phone with a Kamouflage-based password manager i...
Hristo Bojinov, Elie Bursztein, Xavier Boyen, Dan ...
CCS
2010
ACM
15 years 8 months ago
Data protection in outsourcing scenarios: issues and directions
Data outsourcing is an emerging paradigm that allows users and companies to give their (potentially sensitive) data to external servers that then become responsible for their stor...
Pierangela Samarati, Sabrina De Capitani di Vimerc...
ETS
2002
IEEE
144views Hardware» more  ETS 2002»
15 years 3 months ago
Creating Shared Knowledge: Instructional Knowledge Management Systems
Document management, information management, and knowledge management are three processes of an instructional knowledge management system (IKMS) that require different ways of thi...
Gerald S. Edmonds, Rob Pusch