Sciweavers

5722 search results - page 196 / 1145
» Security Function Interactions
Sort
View
127
Voted
WER
2005
Springer
15 years 6 months ago
Requirement Elicitation Based on Goals with Security and Privacy Policies in Electronic Commerce
This paper describes a method for requirements elicitation based on goals for electronic commerce systems in agreement with security and privacy polices of the site. The method in...
Simara Vieira da Rocha, Zair Abdelouahab, Eduardo ...
84
Voted
HICSS
2003
IEEE
112views Biometrics» more  HICSS 2003»
15 years 6 months ago
XML Security Using XSLT
The eXtensible Markup Language (XML) is regarded generally as having promise of becoming established as the general purpose framework for enabling transfer of data amongst heterog...
R. G. Bartlett, M. W. Cook
107
Voted
FGCS
2008
107views more  FGCS 2008»
15 years 25 days ago
Dynamic security context management in Grid-based applications
This paper summarises ongoing research and recent results on the development of flexible access control infrastructure for complex resource provisioning in Grid-based collaborativ...
Yuri Demchenko, Olle Mulmo, Leon Gommans, Cees de ...
113
Voted
IACR
2011
104views more  IACR 2011»
14 years 12 days ago
Secure Multi-Party Computation of Boolean Circuits with Applications to Privacy in On-Line Marketplaces
Protocols for generic secure multi-party computation (MPC) come in two forms: they either represent the function being computed as a boolean circuit, or as an arithmetic circuit o...
Seung Geol Choi, Kyung-Wook Hwang, Jonathan Katz, ...
74
Voted
SIGGRAPH
1994
ACM
15 years 4 months ago
Predicting the drape of woven cloth using interacting particles
We demonstrate a physically-based technique for predicting the drape of a wide variety of woven fabrics. The approach exploits a theoretical model that explicitly represents the m...
David E. Breen, Donald H. House, Michael J. Wozny