Sciweavers

2560 search results - page 126 / 512
» Securing VO Management
Sort
View
BCSHCI
2008
15 years 5 months ago
Helping users create and remember more secure text passwords
This doctoral research aims to persuade users to choose and remember more secure text passwords. The first component involved user studies demonstrating that users can be persuade...
Alain Forget
DEXAW
2009
IEEE
141views Database» more  DEXAW 2009»
15 years 5 months ago
Improving Practical Performance on Secure and Private Collaborative Linear Programming
Although information sharing in supply chain management dramatically reduces costs, parties are reluctant to do so, mainly due to fear of information leakage. Solutions based on se...
Rafael Deitos, Florian Kerschbaum
HICSS
2008
IEEE
98views Biometrics» more  HICSS 2008»
15 years 11 months ago
Improvements in Security Alert Analysis with a Truth Maintenance System
A high percentage of false positives remains a problem in current network security detection systems. With the growing reliance of industry on computer networks, and the growing v...
Albert Tang, Pradeep Ray, Lundy Lewis
ASIASIM
2004
Springer
15 years 9 months ago
A Security Risk Analysis Model for Information Systems
Abstract. Information security is a crucial technique for an organization to survive in these days. However, there is no integrated model to assess the security risk quantitatively...
Hoh Peter In, Young-Gab Kim, Taek Lee, Chang-Joo M...
CSFW
2007
IEEE
15 years 10 months ago
A Formal Theory of Key Conjuring
Key conjuring is the process by which an attacker obtains an unknown, encrypted key by repeatedly calling a cryptographic API function with random values in place of keys. We prop...
Véronique Cortier, Stéphanie Delaune...