Sciweavers

434 search results - page 18 / 87
» Security Documentation
Sort
View
ESORICS
2009
Springer
16 years 1 months ago
Authentic Time-Stamps for Archival Storage
Abstract. We study the problem of authenticating the content and creation time of documents generated by an organization and retained in archival storage. Recent regulations (e.g.,...
Alina Oprea, Kevin D. Bowers
105
Voted
EDBTW
2006
Springer
15 years 2 months ago
Query Translation for XPath-Based Security Views
Abstract. Since XML is used as a storage format in an increasing number of applications, security has become an important issue in XML databases. One aspect of security is restrict...
Roel Vercammen, Jan Hidders, Jan Paredaens
97
Voted
ETRICS
2006
15 years 4 months ago
Visual Document Authentication Using Human-Recognizable Watermarks
Digital signatures and message authentication codes are well known methods for ensuring message integrity. However, they rely on computations which are too hard to be performed by ...
Igor Fischer, Thorsten Herfet
115
Voted
AISM
2004
15 years 1 months ago
Understanding Challenges of Information Security Culture: A Methodological Issue
Although, many organisations have implemented technical solutions to protect information resources from adverse events, internal security breaches continue to occur. Therefore an ...
Omar Zakaria
87
Voted
DOCENG
2004
ACM
15 years 4 months ago
Aesthetic measures for automated document layout
A measure of aesthetics that has been used in automated layout is described. The approach combines heuristic measures of attributes that degrade the aesthetic quality. The combina...
Steven J. Harrington, J. Fernando Naveda, Rhys Pri...