Sciweavers

14824 search results - page 86 / 2965
» Security - Introduction
Sort
View
97
Voted
CCS
2009
ACM
16 years 1 months ago
Semantic context aware security policy deployment
The successful deployment of a security policy is closely related not only to the complexity of the security requirements but also to the capabilities/functionalities of the secur...
Frédéric Cuppens, Joaquín Gar...
SOUPS
2006
ACM
15 years 6 months ago
Aligning usability and security: a usability study of Polaris
Security software is often difficult to use thus leading to poor adoption and degraded security. This paper describes a usability study that was conducted on the software ‘Polar...
Alexander J. DeWitt, Jasna Kuljis
211
Voted
ICDE
2006
IEEE
179views Database» more  ICDE 2006»
16 years 2 months ago
ACXESS - Access Control for XML with Enhanced Security Specifications
We present ACXESS (Access Control for XML with Enhanced Security Specifications), a system for specifying and enforcing enhanced security constraints on XML via virtual "secu...
Sriram Mohan, Jonathan Klinginsmith, Arijit Sengup...
ECWEB
2000
Springer
103views ECommerce» more  ECWEB 2000»
15 years 5 months ago
Security of Electronic Business Applications - Structure and Quantification
: Internet based business leads to new challenges for Information Security with trust building and partner protection as the most important issues. This article gives an overview o...
Konstantin Knorr, Susanne Röhrig
CAINE
2003
15 years 2 months ago
A Unified Architecture for the Implementation of Security Protocols
Most security protocols share a similar set of algorithms and functions and exhibit common sequences and patterns in the way they operate. These observations led us to propose a u...
Ibrahim S. Abdullah, Daniel A. Menascé