Sciweavers

2560 search results - page 125 / 512
» Securing VO Management
Sort
View
DBSEC
2010
162views Database» more  DBSEC 2010»
15 years 5 months ago
Distributed and Secure Access Control in P2P Databases
The intent of peer data management systems (PDMS) is to share as much data as possible. However, in many applications leveraging sensitive data, users demand adequate mechanisms to...
Angela Bonifati, Ruilin Liu, Hui (Wendy) Wang
IEEEIAS
2007
IEEE
15 years 10 months ago
Team Edit Automata for Testing Security Property
This paper introduces a mathematical model, called Team Edit Automata, for evaluating software security properties. We use the model to describe security properties and their corr...
Zhenrong Yang, Aiman Hanna, Mourad Debbabi
HICSS
2006
IEEE
82views Biometrics» more  HICSS 2006»
15 years 10 months ago
A Preliminary Investigation of the Impact of the Sarbanes-Oxley Act on Information Security
This paper examines the information security implications of the Sarbanes-Oxley (SOX) Act of 2002. It is well-established in the information systems field that managers do not ran...
Janine L. Spears, Robert J. Cole
DISCEX
2003
IEEE
15 years 9 months ago
Fault-Tolerant Mesh of Trust Applied to DNS Security
The Domain Name System is critical for the proper operation of applications on the Internet. Unfortunately, the DNS has a number of significant security weaknesses that can result...
Wes Griffin, Russ Mundy, Sam Weiler, Dan Massey, N...
ICDCSW
2002
IEEE
15 years 9 months ago
Switchboard: Secure, Monitored Connections for Client-Server Communication
Prolonged secure communication requires trust relationships that extend throughout a connection’s life cycle. Current tools to establish secure connections such as SSL/TLS and S...
Eric Freudenthal, Lawrence Port, Tracy Pesin, Edwa...